Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23/01/2024, 02:00 UTC

General

  • Target

    https://r20.rs6.net/tn.jsp?f=001DbRhcSnsRZQENkJhpUe2wMzi78WTJcWjdzLfLyZur2YsWmKqlrDzVasCbXwx9QVNY0U9ydWuo9LR48I1oHXaR1kvC15J9kYvqGSSHLTg_zvyzVT24QoEYMtCVFwwYnH-RSmGcj7mSP1Ge7k9EjkVgeaZaWa709f6ifIim2JQLeV4X42fFHmmjOJHVwPH3r7pC99BCYbibidYWbdIVap680mifqgOsdwMbe0PtitVEIwkAuZ0OerflIx8fqzE08FzRKtBGs-6hFUJs7swIJAR37XtmyDWUK5-J1f99fOjmKahhZfIPjfMOguIPsbX_v4jUhcUDUPApFKrU8-GA-3cGbetigctfpdRH9cI4A0IvMdEsiF590bgrfG8G5pgcLnBfcmh6dPm0wboB9hVB13fKjWi517BHbMaZXN_0a-pqTazPDVi6KNPHQuoR5DZbJI-tIzJl6S8KcbxwaGTmWDSPflUiX3O0u1tdELh4xHoLjDnz6g5LOsjvzTuDNusfT-y47AYc5fHEHj6FS4JAt6_Q5Tbzp9Jaz_y0u9nM0dtbA2IrXCpZ8U-Gm6ulqW88wboJX5SmNJzqhnMlHsd4iNPQZR1C-7NwE4rzev7J_SwlSQuDQDjxe0RLF9EKufkQV1nRA1sCHkr2U2w35Z1iTSRcJsys0GCq_u4-tn1Z3mF4ZGZTZBH-bETO9mxyK-kQX7pMsMyQEN32uImLtQQ2p3XD85Ylg_PprfmR6HTXBVBvZ6e_p8PZtkCtiJ4I47NqNPg0biNL_PPQCs=&c=T53HByJOw96RjsviZ4AN2KPXBcM0Isqsicj3qYQkAWkSKGRhTeySNA==&ch=BkbRxjEoOjyxgJHTQCejw_yp5BblDLBEFKRwkLBs1ryHqKVuvjbcwg==

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://r20.rs6.net/tn.jsp?f=001DbRhcSnsRZQENkJhpUe2wMzi78WTJcWjdzLfLyZur2YsWmKqlrDzVasCbXwx9QVNY0U9ydWuo9LR48I1oHXaR1kvC15J9kYvqGSSHLTg_zvyzVT24QoEYMtCVFwwYnH-RSmGcj7mSP1Ge7k9EjkVgeaZaWa709f6ifIim2JQLeV4X42fFHmmjOJHVwPH3r7pC99BCYbibidYWbdIVap680mifqgOsdwMbe0PtitVEIwkAuZ0OerflIx8fqzE08FzRKtBGs-6hFUJs7swIJAR37XtmyDWUK5-J1f99fOjmKahhZfIPjfMOguIPsbX_v4jUhcUDUPApFKrU8-GA-3cGbetigctfpdRH9cI4A0IvMdEsiF590bgrfG8G5pgcLnBfcmh6dPm0wboB9hVB13fKjWi517BHbMaZXN_0a-pqTazPDVi6KNPHQuoR5DZbJI-tIzJl6S8KcbxwaGTmWDSPflUiX3O0u1tdELh4xHoLjDnz6g5LOsjvzTuDNusfT-y47AYc5fHEHj6FS4JAt6_Q5Tbzp9Jaz_y0u9nM0dtbA2IrXCpZ8U-Gm6ulqW88wboJX5SmNJzqhnMlHsd4iNPQZR1C-7NwE4rzev7J_SwlSQuDQDjxe0RLF9EKufkQV1nRA1sCHkr2U2w35Z1iTSRcJsys0GCq_u4-tn1Z3mF4ZGZTZBH-bETO9mxyK-kQX7pMsMyQEN32uImLtQQ2p3XD85Ylg_PprfmR6HTXBVBvZ6e_p8PZtkCtiJ4I47NqNPg0biNL_PPQCs=&c=T53HByJOw96RjsviZ4AN2KPXBcM0Isqsicj3qYQkAWkSKGRhTeySNA==&ch=BkbRxjEoOjyxgJHTQCejw_yp5BblDLBEFKRwkLBs1ryHqKVuvjbcwg==
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1572 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2444

Network

  • flag-us
    DNS
    r20.rs6.net
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    r20.rs6.net
    IN A
    Response
    r20.rs6.net
    IN CNAME
    rs6.net
    rs6.net
    IN A
    208.75.122.11
  • 208.75.122.11:443
    r20.rs6.net
    tls
    IEXPLORE.EXE
    392 B
    175 B
    5
    4
  • 208.75.122.11:443
    r20.rs6.net
    tls
    IEXPLORE.EXE
    392 B
    175 B
    5
    4
  • 208.75.122.11:443
    r20.rs6.net
    tls
    IEXPLORE.EXE
    354 B
    175 B
    5
    4
  • 208.75.122.11:443
    r20.rs6.net
    tls
    IEXPLORE.EXE
    354 B
    175 B
    5
    4
  • 208.75.122.11:443
    r20.rs6.net
    tls
    IEXPLORE.EXE
    288 B
    175 B
    5
    4
  • 208.75.122.11:443
    r20.rs6.net
    tls
    IEXPLORE.EXE
    288 B
    175 B
    5
    4
  • 208.75.122.11:443
    r20.rs6.net
    IEXPLORE.EXE
    190 B
    128 B
    4
    3
  • 208.75.122.11:443
    r20.rs6.net
    IEXPLORE.EXE
    190 B
    128 B
    4
    3
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    799 B
    7.7kB
    10
    13
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    753 B
    7.7kB
    9
    13
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    831 B
    7.7kB
    10
    13
  • 8.8.8.8:53
    r20.rs6.net
    dns
    IEXPLORE.EXE
    57 B
    87 B
    1
    1

    DNS Request

    r20.rs6.net

    DNS Response

    208.75.122.11

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f517c3a37baf2001d03e1c961d1f32c2

    SHA1

    1ff179066cca45af8b4173b4cb4bc53662e47081

    SHA256

    2a19a110bebfa0d4638eca651598a556d0a7f4b0e140fac50de1c5c43526498a

    SHA512

    722dafff03523ba12651ddab5cf36e3a23ec4c367aec5ccf99cc2d70dc6c28f79385ccec7642e47eaa15208f694b8ab41d77f222aafe6df2d85f05c441c30bf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07b573ada0652a9d25fdf2ac8b4356e1

    SHA1

    89fc2109014f3f197e24f6db8379a28b48648859

    SHA256

    5505f9c21eda68c7015a13e893aca98d6cf0f2a95c3793f2387c0c39585ab305

    SHA512

    c61d07a57e84f878daa4172bd499e01380dfa5c05f0b18fde1af74d28079c972af5612a0582b54184fb7d87243aafcd70ab364e67e31c712691418bb6efd6e58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e18912df94aca47e913f343ac44f451

    SHA1

    832150be85c1388a068e453412af8093f3fdd157

    SHA256

    24882a015c8bfd5a1e37b50eecaa11c0e982bb4eb26d86fa0dc168ccfdf04c29

    SHA512

    d667e10cd62581d0a594da9cd0898dca88d0d289926d5bc7d2765d6acdbe9f0c84aff20c687b22a92c9b08f4d4f9c2bc7b38d480a48facaaafe8a395267cd94a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8975f8456e905e2563c7d7f3d2a6a12

    SHA1

    68135d37f5d734a65827a2656d3e6b068dd23be0

    SHA256

    b86bc7ebb22276e74a042147a3517e5ee31ece439ba9123898b1235177492e95

    SHA512

    092de3ad4b6c66365b811aa2edd1a0572046fc56ab70ea6f013365d94ad6b2e40805f93c7b2af396f6612d1916bbc3cfafd85364b188ad96a4062b98a5577afc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e093502e6f9fdeefdeadcf915e4b784

    SHA1

    fc919e9645f4c86acfd50f1c2a6832d0c581fcd8

    SHA256

    17e49f57a1280c31848d93ad3b480d88979a56b64e4e88d683bc706b3ab264c0

    SHA512

    4a9db66d29f6877a17fda7459d0308825b2a0174f0cfedf09d5cc6d4599ea98e8f67190ad9ca82b0e709a04c54d219978a5616c9b1443729cc7ca0576174c8d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e11e131179e3b6e75baac3d9894ddc48

    SHA1

    69857d7be480f433c694ed0ae93f1ed1c95bcbff

    SHA256

    86d72bc7fa3c4243141f25609152022c01209973c4aafaac2b76a4552943f552

    SHA512

    d80c23f74478e341976f49c186b6e4b6c0f23f49e00f798a4d3625e621647c3c1df47528cad96693dfc8dea03ac21a9d9a27d408c088f6e6c3e4c4a5fd8e4204

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d96c619a214e48225367af3d403034b

    SHA1

    bed27698619af8d3ede67c3b628721cdfd95480f

    SHA256

    e599530648390744b7eebde527d006cf504855bfc89053c323729427cd62c18e

    SHA512

    1b16804c90ca5a3e7c10358962d37c5bead3a7aab7f85ec9a0c95c8e404886a211c7da07be01cce94d1b8a6d7a98888e78e33276cacc0196eb2e5c346a76cd6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39990771a2e68a865064df571fc888c9

    SHA1

    1f6bc557a392e6c606144a4211cf36860be7a5ae

    SHA256

    a4244b0cb4dde5692f0dc103b18a0ea58682053dac10be6acf0c820e59b36915

    SHA512

    164de6e126abd7e39455cf51228762228c4db7a0e699dcaf5e6da0085559e7d740695c372255ec757bdd3b416b61d269ddee2e6219300f3bb1e0d9d4132d9f21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7aced3c3145cd4fb5da0e298e8b2d3c

    SHA1

    ee1f4a3bb62df2e5cd6e6a3860bb2536d418ea1c

    SHA256

    a41bd41f133a3c42778e2ace1b883bf133f7d87c81f115331c4a87e5cb501c51

    SHA512

    bf5fbcd777ca7d3a08c3cd1b0630dc112ca04fb55d20b15a0a6ffad84d96be10b379e29e9663d82565b534f3b09a60534c8bdff0fdd80957b2e6ef2c336b6d6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72c8cac27545ececb47c7cc8c69ff01e

    SHA1

    45affb5312ca77d5c94000aefe063dfbaa202ed3

    SHA256

    a11fb624658f2b8b36332f1b39bcf6ebf72c1817cfbca260ec4dfd3b6d3dc001

    SHA512

    6b84da7cea1f2e9186692fe39ceb8f54591dd34d4bc40a8c6700399a0346481e2cfb8e4240a6b5fe2c4e4d7f00d622a24f8896a57f79c1ebb0762d071a4b5dad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a865f4f508a14d0989f9256241d6f286

    SHA1

    426f322a564cb99882a79436e62ac66e70c05e4a

    SHA256

    fb10b92a04e175e96815fc0f051a5b0b4fa0984f5e505136178a1b4b0883419e

    SHA512

    721960603ea21891e8748d46340f08472dafef8fefc54ce4df783a370b4e7ca7d2014cbadf63a58856863aa8ef6f3ae008c75a1733ea815117f62a32d0948bb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe016b7baa7c63131e92b20d074359ca

    SHA1

    6bc4fe344fff7b69c2b635d03e2d303f39cb75c9

    SHA256

    f521c97d764e2bfd5159398147c91432f84822d6584b39caee1f8493bf8e5e1d

    SHA512

    c960be1d4afc3ef57f2d8eca4fbbad8f49050b9948941076031f9cc232e82807e8db5a2d5ce6bd9a6bc4c5b7dd3ffd35a7079c04fddfc7476caf6389aab4fb7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd4a2bb686a60c09afe70cceb5a2762d

    SHA1

    a52b5800551007a252bc079d5293a66fb7fba9cd

    SHA256

    0b9832c378605e28d0eaab13cc8d71a1c81f46cb8316d41336beea38238fccc8

    SHA512

    c6c6363ba8cc6dbe1da378e9da85dd9394163dbd0fca106b70b9b9cdfc917fdff0c7b14a4573c4ac6e99e9a2a29bc8a4b69805d52add4ef49ab9c5df486d9c63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da98bed0b3679def7d0df8b5e9ef3972

    SHA1

    08fb49eb83ff93d2b6e4f0d33a7198011ea3a9f7

    SHA256

    8b254569d00aaa29bbac23736dfc5f2b203b9f577a01a5b042cd6369b5a627c3

    SHA512

    69a5171054f6632c023c0bbea3468e29efc1c5b050b7ca16c98acf3253999a82cd54beb287d44f5b38717be7d446ea2bc5e34c7999a8bc76ceb16d1e5781f8ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf3456ede627e439297af103582a3d1b

    SHA1

    00e7683f210d92e8b390c74661c8b33015842a0a

    SHA256

    e7705520460524f39128a3109118cdcffad909c72d50414b8e5be5ca826c02f7

    SHA512

    704fb01ea0ae2cbf73224ff1d51b4c9072b72a4a9b3ae87ecd0e835d2af44a90a77df072692ff5b4c004dbf65f77d73c72ba274029b70b38da98c3496ef0487d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94ce16d6294838efdf492f833349f931

    SHA1

    745add86b468460e61d276568c10931c9a2114e1

    SHA256

    ec53e6dc3111a714c6c800f77ab7b00cd86fdc2262f0c1be0bcd902cccf1bed2

    SHA512

    54317739b8f6e81fcfe76ecb2cfe42599b72156b216f1f1747d0e97dd14b6d3858312a010f2aa21eb400b34dc6e0d96c48180832a745501e2b53e6b53fae9216

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e88b993c70a7223d1b7a87ac7e8ce3ef

    SHA1

    1607b43c976700902a5095017bef2c1bd5572592

    SHA256

    7ccabdf34e65189be7534028ed5b66d17cbdefb3a35aba580b4305583d2b3c7d

    SHA512

    f1e2338e13dd3097d04a9a5f7e3739d2b6d9f24245adb74d951b3c81de379bd8a8aa441799996d726ce34056ba993ea5b33f09e36a36b5bf63fc3369bbbf2a12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    93518fa7ccdf6bbe219f87c2077a08e8

    SHA1

    a051caf318aa58cc0de089d55412188279ef907a

    SHA256

    b145e5c5cb31e2db7936b79b669003a0ffea47579587483d6f9536c1624db0c2

    SHA512

    26738c96741f33762777ad28479c19a62f06b51930ec424983e3f6ff74159e963b4ca3cc507f0fd06d61b98a3db8e074a16e684a40ae1621f359e879d70cb12a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    921bc5c475283146b08d533b73a7b02d

    SHA1

    7439e8e6b9d631609e6f44a3c805710372340d02

    SHA256

    321dfc2ea04f0631b23877ab60bdd8450bf5267570c7fbdad3f0c882731538de

    SHA512

    70e4977e3e39a960ee0c8a8186897e6319df21de786a326a7cfafdd3cb679152a763224ea4dc5bdd73ebccdd219fcb335e1116d9345b6ebf65d0b6019b93d9a2

  • C:\Users\Admin\AppData\Local\Temp\Cab7263.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar7333.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.