Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    123s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 06:08

General

  • Target

    8622da09e1743affcd0fc4b61b4ff682.html

  • Size

    73KB

  • MD5

    8622da09e1743affcd0fc4b61b4ff682

  • SHA1

    31e3d78f1bebfbe051adc388e0dcf9f6aad84d29

  • SHA256

    70a67aeb1977ea695d81e32ca50599fca4b76db6aac6e16e4feff46f22d39009

  • SHA512

    0c85c9073d6fc7adde62c61b060c477fff22ecbbcf3ba285cda355d6e681f319b25802f41e9517ff10bfa254713d597a033fded4e4873a31e894e22b21c455f5

  • SSDEEP

    1536:SsZ/WvSFQv77W5wt6n9g9b91y0GLrByAFVt7A/0:Si/WvSFQv77W5wt6J1x7Z

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8622da09e1743affcd0fc4b61b4ff682.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    bcace81d477f3c718f9b8caa06bbbdcc

    SHA1

    966f9283be355a4397633243c28a26ace4f8f5db

    SHA256

    536e164c1bcbbe417f805d4d9722d6e8d934ee957fb54bb0a1faeb65336f6294

    SHA512

    99e5175ccc544a20ce6a1d944002ceee21022eee15c9815ec61fa51785480ff43071c239c0fc9ccbeb0a036fe1b7cd62a4f45b1d9e30da7889410e26f747b679

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    bd2c66a1efe089bdf4ae2cf21d8c25b2

    SHA1

    a867aa521218e5361111f9b9e4897ccfbc56be0b

    SHA256

    6c7286886cf3b2733afad9313f5583e3709f2a4cf301eb39d2bee7bbc7007dd8

    SHA512

    8d864eaddebb70d2c20441932d11d067348d8d7db8201a57396be5e023b9f0094a0aaffc8f23d1a49b6364ee50b344879325a02ab889a6313a0c17cc6df3dc7f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\versionlist.xml

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6AXLYU2E\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee