Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 08:34

General

  • Target

    4882f005a90cb43839a19a888228b1f4.html

  • Size

    4KB

  • MD5

    4882f005a90cb43839a19a888228b1f4

  • SHA1

    e9775f64c76a392a7a252f2b7ac3ff89e367568e

  • SHA256

    32c18fcaa7b7785085cd16d38f5d51cfbbf7e0458188faef564ae6cd2194cfd6

  • SHA512

    62e4254bbfdf1619ed8e8ceab6e6973d575ef4304054100a5a7bf15ed39686c15742c6522cff1dc019e74b761c814aa815034da76e5119e4c1eceac1c8f64b3f

  • SSDEEP

    48:pNUXii0V9NbxMjGqv+lpj/kSxVnsbg04Uxyime8kCKff8h52EEF5Hbb6ertWMJ:fNbxoGqeN/kSXnOt9mTk63EfSKtWq

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4882f005a90cb43839a19a888228b1f4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1236 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    042fe1f6b15469e6e96f4325ba1a4a19

    SHA1

    70ca5f7bb2b73977d76fa2045986660aecba71a4

    SHA256

    bb55a303385d989a8f8182979f7948f5289950b1235c016db072cac5df0bb796

    SHA512

    22d9014716967c01cdbb12d02879fc44db8271236c8a84bfc3f948bf289aed334b60aa4c30851eb72900fc03d46108df6080e2fcec6a1ecaa26e86e138a76fdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b3867d294d6d0fb5b0c6ab1917fdcd8

    SHA1

    fead504d27f7e46c14c83a7264b38d2b5888df22

    SHA256

    ca0e6dc0e4fe40e0cc1d9441d9ad1fdceff28889a1b395d2c11213acc506c806

    SHA512

    49a7faa6de882a1adbe5c230aadd9432bcdd62ad55fad082671912f68ff7b99aea291440625abcaf28a3d884b1b60511795babf81bf6640a70fe5825a68bcee8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e0ca9dd482e17141a60a1e93cb4a091

    SHA1

    eb9bd24d020e0b91f59ed619d199c0b048f0a2c8

    SHA256

    4073d44365d56012a9bec96e8fb80f83a8c0fecc615bfe342a2aad6bb97cbd61

    SHA512

    3c5ac9b423a6b00ea3604c7cdf5bf5139ccaddb6fba3093368c3e8dd2e2e64c54fc3d5161bcf33b3351fd51cf2eab4c357d51d55a8d86eff0d84d1c50eeaf43d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0a97efec9e4cc4db05af316cc39b6a5f

    SHA1

    03732fa59aac16e1a8731cdd204553bc75ab5391

    SHA256

    adbfb5469763f6dfca5acdc523bf5e424419c58173df8253a5e763b84393b8dd

    SHA512

    27dace4193f4a080e9ad8b367ae875cc5cd0589874c0bf03a3e9dbf5ab6df522d7c46f3383dc2dd9959352c62495d25faf176642e21b5954603bfcacd695c687

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f8479b8e042308d464857a52ca2dacd8

    SHA1

    8ccb5e6ec8f4fbc05dfc0633b5e55f1a5062c37f

    SHA256

    f3e2e86a7ef33422f4710b6f9de8bdb2b3719e3558691fa78604283a24b1f82e

    SHA512

    d144877e9e8b6f981f7c0248a9878405650b7853785a65e3dea10e478af97ceafa84adc7e79ce5a930acaedde128924cbf566180b0ac9e20de2deaa70753b4b1

  • C:\Users\Admin\AppData\Local\Temp\Cab2E90.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2F31.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06