Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 15:57

General

  • Target

    bc36d8e82652964d29d476f794103c15.html

  • Size

    12KB

  • MD5

    bc36d8e82652964d29d476f794103c15

  • SHA1

    66efb1451ddcb1117ac9d3d400520d9ed68a8f40

  • SHA256

    23bfe281ecce32babc55edc32776fe934e736e697937333fce397ee4a5ac97bb

  • SHA512

    a7cf6e00f2bf84643a3f79d09bc3f69e4f78c81e4ce84842d09ab314e277e51179db2070a5a79d70206de01d9f9d74871b92e344af7b31b8359c2f7cc04371f3

  • SSDEEP

    384:u3u7YQ1bJld6rTyv6Rb+nQKrlibQmYMH/pMF1E:BHt5gyvCAdhi8yfpe1E

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bc36d8e82652964d29d476f794103c15.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c634c41434496ec7e87c460f85670a7

    SHA1

    f752e0a8ba9cf617e3bf4539301980ed77532087

    SHA256

    d9e5e45546a0670863d87aad4613f6d7ed46b2a3f1d0ed6e79c442ec263ea771

    SHA512

    9a3bce5c2a9cfb009e6108277a663646ec01bd75afdb64c39af057734a624d295e074870f843c8feeaef408f51c22feb36c9c9cf7ea626cdaeca05282b7cbb95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c86fc6d33cc9ae759f5bf286e3794867

    SHA1

    de4750ed16ca62fe155280c52415451735c15a29

    SHA256

    ca192a4844839c1c85c981fae1084b53fa6a59ae9b33bbce60f320695225bf49

    SHA512

    ec834228c16a85b0277211a974ce076b5d89f1bab18142568ad36bda5c621aac9396640fd3932d667f0998cb568837f5545774a0e6ae44e917df0c5506180c69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7616b8282c58fabcb6b986b1f6c7cada

    SHA1

    182036f0650117a52ad8bcd40c0d66375f707c89

    SHA256

    205a58d9e970bf0d3fe9f2fac0215690841887699b5ef640effbf9baf8112778

    SHA512

    c418ffff7cdde62f78feb35ed3b53970553f9388ce210d44ef426f6c6aefcc1cf20668c569476ae10cbbdd46f61f14ebc97331e270a4400e68cdeacfdc314dee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e1bbe61fd83f5abdf323b0cd6855ef07

    SHA1

    fd14b12709240487ec7a7446fa75d195987f5adb

    SHA256

    e5759d21ca9a7252df086d2919356b540984d9e2ba54ae2b0b2f47f26ecd0aeb

    SHA512

    bffa123e53a7924e7d6c836505e17e922524c0967dafa7da3728add53ce8cce2c25411c5460e392b1a58d9098ccc6492bb3f3dd80d4d89f25a30da05e61931e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d4b9980f4e729a25022837fa60598b4

    SHA1

    5e3f17f07015de1c3c319a128993058c2ee052df

    SHA256

    fda00c33cee58df47cb6a9ee81720e06a243b9ec884110e6e635229696168d11

    SHA512

    62cb96b2287e5457a12bdb84701b6149b349c8ea62bac252f511fc0c4960e4920e9dc260fa63660e5ee31710520fface1a8c3d68a2ea75657ab4ed87bd7ee51c

  • C:\Users\Admin\AppData\Local\Temp\Tar7E9A.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63