Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 07:26

General

  • Target

    c54fc6805802d0ee6d9e8934ced26f19.html

  • Size

    26KB

  • MD5

    c54fc6805802d0ee6d9e8934ced26f19

  • SHA1

    1a9e8fce1dd7a26c95a83964a66df0bd4eac23a5

  • SHA256

    e9fe0bc41199e0cc8aa801884c0d8ab17fd6fe3f5043767e601f3162b8d9b793

  • SHA512

    44b8e6f6cb8f0fa6c18e75077ae7d23cad540a4a2a961b70d9fa37f075c103f6fe1315e5fdc1f4bdb8976a9a3582f0df097fc6c3a6340716cbb8b24528705a5e

  • SSDEEP

    384:4+QfPFd9QZBC7mOdMciBKfpC5IgSnbmFe7AciH6JCkJvAgo0iHAAPd:Zcd9QZBC7mOdMcPpC5I9nC4nIP0iHjPd

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c54fc6805802d0ee6d9e8934ced26f19.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa4ff23f72b1f5c7679b60607906a25b

    SHA1

    8e8e19daffa4ebb1ea49e2e5942adaf9622a8094

    SHA256

    5a84a3618b612327f5c6908b020ea6e5bef67f3d9866fed2ac0d94b2f884519e

    SHA512

    ba48b4a8595d9f72f2b968985be400b4fb619e5a9193239fc049d5b272bad62f403b2e98e9db2370c7517f1f9d6a9a68d06e2afee06bd5244f27bf497e251b87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e5956354bed637f3a079214860038cd

    SHA1

    991346325608fbc2e6898de6ade03fd9db5aa7a1

    SHA256

    d2b25a244d677862c1d4a65254a537fef0aab7c6cedb5350fd3ed6f799e4fd82

    SHA512

    98a2026f2d8f9dda45c52cbb8e11a858395e8f32417136043137272e83f2ca41028bfd275d152d6c5a8a735610b95c584b605ae9316fd5b6dc2b85ae11eb1b87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d5b587b83e71b0b41bdaa33281b3a8c7

    SHA1

    0a753be579cd33250a200c0fbdd4d76793895fd1

    SHA256

    17191f619a634ea5b045f6c8d56b775dbe5980cdea3b18e90ce01f3e67882c34

    SHA512

    813dca254e32dcfd736cfec7e69f24b5c908e6c8340cbd18edc135c27b38dc3935d01f9506d6795e0e89a6877d665574b2751ac5d23e6be5defb1b795d901dd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9297b6eec6e37105d64ea9dac74b3173

    SHA1

    96ef61f0910124d9ebc734933bdb2c2f25aa7d8f

    SHA256

    928c8c66b5c776898a10c7cc3ac9d6a95c998153c2a4f0b768494a5490d097aa

    SHA512

    fbc82a21f8fb898f731b8d9292dff67593939cf2f106722a51f2cebc1060084529c69c3e464c3ec21e4e42b5a54e125bf3b94dc0433716634e998cc9d24f3ae7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7603280e7005cda37b61b56c192f0000

    SHA1

    59e3eef7541efda916aa20c9d0f038d50acf0583

    SHA256

    6bd9c59f39717357b5246fdaa3b5283ed55e956e12c4dddb499258293158d5b2

    SHA512

    df047a6de72ea89de4c7f86687e289e67c8371c93ca6565453e90631cce26944882bbe3e6bb460d897705cbe029b06a8b5bb40776fbab4a897452c9b2c538020

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    daa9b7872871eb10030613ce4ec144a3

    SHA1

    f0740c14cca20983e98e381d8a9678d3cc450c3f

    SHA256

    0b1292ef0882bd243ccb0591dd0a8156108ef3cf7e00ea4670bba66b45306aee

    SHA512

    ac36af87e8906d1ce8f3f7c130e8674e2c33ba69fd0de03b37382e48da61900d67cc312900bea0e969e5ed5bac23c56e1606311398e181bf889e3a8fd428ca93

  • C:\Users\Admin\AppData\Local\Temp\TarACAC.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63