Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    201s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 20:28

General

  • Target

    b596ac812543b633e8bc44148b9424ec.html

  • Size

    2KB

  • MD5

    b596ac812543b633e8bc44148b9424ec

  • SHA1

    a53f4e52e1a210ce74be4ddd7bfb878548d42b64

  • SHA256

    040b8a7a3a6eadc78aa0206c0e857d3371b02bba29955d6931494eda3967d374

  • SHA512

    2a73f69281e2ab54cfa05ab92d13ea7b074524e28b99c096f3ec9f8976383cfa4ce7afc5ef762dfbbb0f87ee01a6dd0f315e14d616d440c6f65b6fb1e9f56651

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b596ac812543b633e8bc44148b9424ec.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21179c44367b9538982c580d13de9657

    SHA1

    4b51d17c3997eded59aaf70214a10a771fbe2714

    SHA256

    815885abf2ee3812b949e2d9b5ed915bf4bfe8735043ab9f938331cf2e898567

    SHA512

    b2ad7b98d0fa43ef9a22286e4ad3a2bc0a61228bf32d16193ab95f071b7bf3641594a64de7bdee63f4e07955532aacecb0b97772e80b2d5180f4417643c0cdb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b7eb0289cb8f4c0950d1bee9ac79924

    SHA1

    3e396c4fc923dc561bfbbf7e1e529a2076b64f39

    SHA256

    8a3de2a989b6bab93f142941926f224a231f8413ce315692141047ac0b358594

    SHA512

    38cc2d667d6da579419227d694e4e7f40d849723937956ddad6de9105b7b89f67151f058011099a3ac1c2f4248c1863a9345108dd5ef8be450e98cfe58743483

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3881dfea7653474b29a1811891f8b479

    SHA1

    88caf9afe5f4820bb218ed5cfe3dcc1d84ee8c03

    SHA256

    302b1a9e79823849a2693872231a446e20e6fc4227bc3db73eae33870e25e1b8

    SHA512

    70b90375c273dbe0e73fc43c75220ee1412e58ff68bba274c5a4ab18e9c26fb6dc618d584dd0bf2974ebd524799767fdb279307fcf483f0e48fb1786b9301569

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    23b48d0340bbb40c89fc8c60f1b3e8a3

    SHA1

    3f17cb2160bb108a8257327fee53c2eb4282cd3f

    SHA256

    1a2ed8edc794ab76c681e052a0eb8e235408571a451cfba304b4149d0f4320f0

    SHA512

    732579863841e9933e0899ac5713bbb2f313990f22d8a6e6d1d56ea2b4645eab27dfeeed59dd2cb4c954e0440f72219ad9ea3018b491af188a5414452f6e01ca

  • C:\Users\Admin\AppData\Local\Temp\Cab15F1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar3B45.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63