Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1561s
  • max time network
    1561s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 17:40

General

  • Target

    sample.html

  • Size

    19KB

  • MD5

    36839085030f69a78bba4047980dc47d

  • SHA1

    fe345f797711bc39b8525c910aa48b26d52b243b

  • SHA256

    b6791bc9d50fc2dafd833c3999ff7b33a0fbb2cf5b1e207ef391805adbd0e66f

  • SHA512

    8ed69d015b7728ad0642e8fa1710406f08e58cb084b695e7e6d98af43ab4ebad6d2ad320b779ae12a81cbfc208d99248762aa6dc706c684d810708cd99078064

  • SSDEEP

    384:rDZjWlDpmReVoOs4bN9ylKeGMgUtHhhb85LYt7hHo2pG94lVJCBXQL:rDWBVoOs4bryI1MDBhbYUYMJQQL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b00897e98bd91825d649cf5014d6c10c

    SHA1

    e79c57df277fb04dedb7181e8cbea79437df0be3

    SHA256

    7fa5b80080b2e6c237f88a23da7ab8ac0f219346dd5202d9741631ec0cd0aea5

    SHA512

    a1257711a6a0dbd65efe58b1573ec7bbffb7cb5c761fa8299ed4e127342c145cf252fa1de427894affc2d8fac9f70f7c9fd730989fa82e877a5d545ffeb9def0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d7314811520fd1525a7b468c48c66a2

    SHA1

    0bcbe9dcea7d34c2aa5089d138f7d13d4e653d0d

    SHA256

    16c670793a21027b6461eee47410e4209187bbe893a62b13e2856b2a921dd8cc

    SHA512

    0ef79ff1d3a2a57368decdd5981ebb07af8eecb0cf31ed3990fe4219eca186aa0889b9559642c9f40e78cb09edd73fa27519e589631189b4db66e1d67fb8f4d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    709c362c55e2b59ceeb7029fc0aca3cf

    SHA1

    b93639996ef8743942e56c1404104038ff253e47

    SHA256

    2bcd7fac24d526005ceb59abe1ffd6a569ab0819df455782eae9eb10abcead48

    SHA512

    1dd86cdce8aed5d71c4c75ee572c8ce57394142f1b25a683ca42cd516fd976430900d020e0ac0d97653de2d03e2790d05febfeafac10b5103a3effffee00c6af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa11b067b236f312ca8f67716c39e712

    SHA1

    5be24a8381a09ba48a40fe032df6aaf1e270b0d3

    SHA256

    fc2f43f5a9a6d1e18abb3bc86329cead074b0e967df3a4a65e1e4075c3aa5be9

    SHA512

    687290bbb7da0841fbc95684ca479a6889f2bf933a427b8ec5c6b74407c38fd74fd6a92712d4510c2e7d7036e7d4d05e3ca64b675a4f3b1df0fae351a3a77f15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4943dfb01c0af2f8084d7ba99b6c5099

    SHA1

    96845e21cd190d3f70b3b927b6ce2b3a73bc8a7a

    SHA256

    121d8f8b4aea66cac1fee1839e87144b68ba19dcfe2c4dc9a35fa7b209ab130b

    SHA512

    11f7796209ae1eef21cec4191191eaca4b5bdea05f52600d17656464e85f424b71077edf52d781d043055760c44799b8bdfed9e868eda4367eceae43942b355c

  • C:\Users\Admin\AppData\Local\Temp\Cab5ADF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5F1B.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63