Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 06:40

General

  • Target

    5a8c3248da39351e81cf42ff3115a134.html

  • Size

    27KB

  • MD5

    5a8c3248da39351e81cf42ff3115a134

  • SHA1

    f8dcb27a2da35b5a6ed27d8e6f410932a9a7ca78

  • SHA256

    c79c018bb04eda5009d48cdaf4c415102d783fe4d26688e2b8379bb2c2f7cda9

  • SHA512

    7b5e660b21be5f361117a6a1c3df9923435240853fec89bbfe517b2f41c4dbc75d44dfc09d97d9fbc10263d0976c68a39129caf30f0720718a96a553e24bbdba

  • SSDEEP

    384:nqcNzIUvB06Dv35zDL1MkLLXuQ/JiAsknUeVZOIgcO50vFs5JO1mQ7hwXT5Wf:nmXM

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a8c3248da39351e81cf42ff3115a134.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7569284bab2e10d8b81ded518feea7c0

    SHA1

    fffacac36784392a48f2a5384bf9fbbb76e77a0a

    SHA256

    fd01372614f1f9c19d9a06ebf712f944aeed0cd8c0568aa84ba414d863e2a674

    SHA512

    0b50be8f62390d205bd110840b75ab2dcadecba9f1bca47ae3e9af2db5cdbfea01d7668e57e892c5c7fa3dccd40e5886803010147eb01a5f0118e53f783f1a29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a76cb7f459ed9ad4abbb9cdf78534ef3

    SHA1

    4d4d712d1e106d44f2cffb6b46fc880277972b08

    SHA256

    d2dcecb3cd227a160a7e8ed994d753bb4e55de829ac38d622187bf01bec329af

    SHA512

    76e5364df1e8068da7b16b2985ba99d9986aa125ab03786dd164f12441cc16cf03a4193b3c5be2f51af8e7e4337799d84c8d032f6058e7148c73e093cf8d56a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e2f716f9a0dd04b85dd753786a37fc8

    SHA1

    cd8342306c610d8627e52a25d686ad98577b0a35

    SHA256

    26414886fc0e102026c6eceea407660204c87cef0800a0cef148fc1068789e15

    SHA512

    46b6801164ff9333ce162254912782d783442ed3a698d774243254cd6f5c719f9a61c9538984747916277f3878650ea0dce75ba5ac5d7a11ef77a53a7f795dc8

  • C:\Users\Admin\AppData\Local\Temp\Cab3249.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar326B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06