Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2024, 21:55

General

  • Target

    51b80073c689dfb5fdd342f5ae18adb4.html

  • Size

    77KB

  • MD5

    51b80073c689dfb5fdd342f5ae18adb4

  • SHA1

    ea80243b144bbe23554f175ee5709c013894027b

  • SHA256

    e3bdc229586bcba0b38bab6b50bb301766c39a71ddf6230e5c66f1cbbb905979

  • SHA512

    d52a854379f0d30d407d84ce3aa25ee16e69313af762a2ce26fafd0e89f820ac0765a79c95e07485cb2d0ac5425d0349fb9b62f40341f2875e4c73b601b8b580

  • SSDEEP

    768:Zcd9QZBC7mOdMstpC5I9nC4wqXFacCvQPd:gQZBCCOdZ0IxC0yvQPd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\51b80073c689dfb5fdd342f5ae18adb4.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c078d64582d64a4424a62c829846815d

    SHA1

    901f4fd6dcf7c44162531a93dd0f7b88b54ed9a6

    SHA256

    f2091eabc680a3b495b74f349375479df74fabd2532617dbbcdd4e956d2f5633

    SHA512

    95d206856706b184a4d62575f96132d9697208523ea8ae15f366cf6a7abbcbec2f789aa418bd83105495366e0404ba7f877a90180cd3e77340db7055ca4b2d0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    318d2d62fd2451167ae98743e0800fc8

    SHA1

    885c761f9f387bc787c5322943676354846c2099

    SHA256

    47fe2df1a7e642a1bf1250e75cc17ef7d409ca498ebe44f0bcd7e73560f77ba7

    SHA512

    c726d21fada0f3bd4532d0e9fa43b428ed7c19863ef8833e651f0b83423a6a4fe9268b886a3e7baba8526feb460e0dfe02626f0c56f864e2aa6912d2b32d816a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    060545cb9201bf57d98f7956baced187

    SHA1

    ae91edcd98a44d94818229b4bcb43f5de188217e

    SHA256

    93776ab5852836d847b509dc20a85a36c6d8c7dff5606144aae11083e344beb7

    SHA512

    db7822527933d44a06f9f6af4d6d3946336c757b9951e7bd28ab26280e6e8a65d5ff5cb2a573b5c8fb07fd7685bd4944c209c708d12cf5b69dc10de1b67ecd99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bb0141600f1e0979c639ac9b9ccbb9e

    SHA1

    fa265105f0e59a736617b5dec562bccf38fec26b

    SHA256

    540c09be918f8594ae7df74ce84065c45c65d95b7b2c6ddaae23984929ba1060

    SHA512

    77c0304cb92dbc6255fff8d00a2eda3bbc95cbd429e421eb938d52c8246fee8abfd37cc6411553cb84cab9814c16417eb84fa62671dab2c815392356eec7adc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a653a82882d9853989d6c058fd8fb19d

    SHA1

    07238d23d5bcfeef58248ca59d813e6a115f2207

    SHA256

    243c0446b5ef010a60905c3ec7c05d0dc92340c82fc500e84488df39408a1d29

    SHA512

    ce53227daa373d1192794e936314efec72928722d1251998bdce9c00b99b27930b4e41c331d2260712c7aaeb4456782b875bc9734423fbfbd2dbe444c915a018

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a799ff13bdbcb9c02af271aaadb90af5

    SHA1

    666a6d05d4b669c8948f4646a97c8cc538188739

    SHA256

    32d3a3b9b7906c09028d8261e30973876786595c78fb8f7711be710a495746ae

    SHA512

    1e544a97b4c655898c0bc5813e3e9bfadabd1b98d74991826a2d7dadf0930002b6cf2c147e16a5f89ab29b8896ab070e5dc2330d15f5a4598fd4d83954952365

  • C:\Users\Admin\AppData\Local\Temp\Cab7265.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar72D5.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06