Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 20:38

General

  • Target

    689691b9e3105cb462f3a4f859528c82.html

  • Size

    23KB

  • MD5

    689691b9e3105cb462f3a4f859528c82

  • SHA1

    90d507b4d1565ba3c989289447763ca6feb23c49

  • SHA256

    9a38b99c5f8b3d6cab8b17cd53bf25403fcfc92427b6e3ac09d3ec2d2372b0c3

  • SHA512

    3e388c78461ace5cf3b93b6d6e5f5604ef58e3a93d21d3b72411255572d18508c94d4dba9645c522025c7af6c4a8e36071dbfd6ef96ebe83cc347c6711a959e5

  • SSDEEP

    384:zfhJITEu11+0tYARONJ1N6qYeiqElT7om:jhJITEBeRSPNpipXd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\689691b9e3105cb462f3a4f859528c82.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    49f252555ef47b8aa362c5d7c52da369

    SHA1

    bbacef3f462b03e69c8b9c52b8614d2d45bd116f

    SHA256

    3b38ced03adecab7e5df47aa2ef0b9856f7b144018e1eeaece5690dd64a0fd5d

    SHA512

    723b232632c663f9cbeaed39d75c6ba6cab9a690747ed93a74eb09cfd0d6fb9bf1caad9d25483e7637f55193a5e547706ab2648326f4b60900c144dc84c59cfa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    4c2df43a321a4d4cb805dc61e8e86a65

    SHA1

    2875a848bb595487c6c6a6d03338c94f88133243

    SHA256

    66163486c9e97f3b7938da6efe83a8b4449b718634f956e1ffebfb87d8d67bd3

    SHA512

    02f642b81a232d9562e23191eb9aa134ec768adaebb3885ec61eafb2673c50c79c12a55690110a130fe94dda1720119f54a076dc0d56846406f74cea16bed0e0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\M8F18HYR\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee