Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 18:42

General

  • Target

    4c2d8ad63097ddd6191225083c6256fc.html

  • Size

    78KB

  • MD5

    4c2d8ad63097ddd6191225083c6256fc

  • SHA1

    6ea63d07a101c0969648396adb94af6ea31e5947

  • SHA256

    73ea3ec663fd44d24773293bbc99434f89abb0f17316df75b67de1562713cb98

  • SHA512

    614aa6d075adb6e680b19a1930e284089866f9c3fe4e6718e73a33c2b12755a90123d129e07fcf9c611440b7b7537a320fa2013868d25de6363fb07c29288f80

  • SSDEEP

    1536:lal/RcNzLYqE/yrhLw9hyC83GKzA/A/Fqv5mwsRzA666ePZc8+:oRAYqEw33BzKA/FqBWzES

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c2d8ad63097ddd6191225083c6256fc.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4f38bdd670b819472da70420241c0c7e

    SHA1

    b3ce730dddc25c77749442d11b43310c616388e6

    SHA256

    146cfd9de36055835fc7efde91d955f09fa3b8d6158846f34b41e6f0af6da31a

    SHA512

    d3e81294840a6c85e4a332ad0708a9e914d49e8dc8542911a8ef7efaaf0c9bb5a619aa93414b496dfd18ff8920553552f07c5c0cf8211c9fc3753e4b2e47cc7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c02047e2aa01a36caaa86715d4350bbe

    SHA1

    b2259bf24b28815167d8b1cae8da69219348cee9

    SHA256

    1228bda5ab1a5fb4615b5ddb5b7989cf97c1512b9e7d388488336e3a652fb204

    SHA512

    f29b28564315104d1870f01197c1e84d2302fd618754385f8c23f1d1bf4b6e1b473afbc78fbc56289aeec8180b90c080eb2f92960f19ab682934d27db6614097

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    abbd5de7374b10a8ca3278a9061137a3

    SHA1

    f474b9a4ec855b81d2f0f65f4905fb47b9a256a4

    SHA256

    607cc2ccaf4ea3e63c78dd79c6b99e7020ad0336c5662d8a1880058a984c1bfb

    SHA512

    fb3352fb7da05f9025380ad3c02b2c15d371ecb6ab18a30bc9cf3138104d098d5c9c048cdb70a84a18abea73fe66b7c80be0e51b0d5633a4a1e0f4148f4d6cf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25beebb0b5ab93ff3dc6bc614d5df1b9

    SHA1

    21d4471992b689501be84466218b13b5f5e48054

    SHA256

    3139f2aec0a44d4d2eb2d6b227428d7413cc310e7b7784e1f497c1c574e1b14f

    SHA512

    a4d301de07fc4437674738b14342415f01e3c251b595196b2d925a4d03aa4e790be8c0e52df17bf014048496d8a3cdd44474995e57448ec6a675988b31ac03db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f2b5db37391707b2ccffe0e9caa1e6fc

    SHA1

    decada9d09e8bb194208ce86780978b1d681c0e5

    SHA256

    424537c3e958037b24f4d891e5d896f93ec7ad52db04bcecac23f9f50aa1e359

    SHA512

    70d4e1719951aaefdb06e053874bfb8fb444740c3e69041c1d70541788683354a526b7cbe038bcf4bcdbb9eca6a844b084eed0f7b5079a143a2fd0efb01c0ea6

  • C:\Users\Admin\AppData\Local\Temp\Cab6F28.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar7101.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06