Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/04/2024, 10:01

General

  • Target

    OEBPS/05_furia00-11.html

  • Size

    9KB

  • MD5

    760d63cbe38ea582aab6db2185bde0db

  • SHA1

    56e19c198441ffef0fd3d57d282cf1e05a7697b8

  • SHA256

    387c0ca321935733cfaa69d79bf7544d3a45b2ff106ad72ea466102816d17e88

  • SHA512

    2b5ae2339ea67563896de2f9cd9b7230566eefc1a4897454f850bb66323d85845ba819b7e02452fa3d9ef076fff2b2747a4494a140c31616618101a4d4abc667

  • SSDEEP

    192:sexJ+vioF7erFZ39ed0QYWKjfhF8kwl2Ic/5NS18:soJ+vHpgrNeyrsAIqx

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\OEBPS\05_furia00-11.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    790b2d530e3e6d622b0169a13c2a2111

    SHA1

    82a782f8bbc66698c5476d4ae6e18a5e7398d6d4

    SHA256

    c072cf0996ff53abbd960fbdaadf7a3820e38c3d20861fdd8170b8f604f13547

    SHA512

    5859f7f33e79ffa1a7cbda3f7fb8d8ff21b1e115307d00ed5ec02bc3ead05b2450dfdcfe9ce388d3c2249f483c4f391aea0651a5d75b6ed029cb7b189f64916d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74dce6d084f4c238f26bb58209c2400e

    SHA1

    435560f7a4f61ceddd0ab14784a14d565e560157

    SHA256

    9bf1afb235e7d8a1ad8b1fce97ee8b796d2108a18768fbd0a557777fd7a485e1

    SHA512

    72b7ab53c0c39c9f831d53364bb82afed95715830943d9dab516386b4c7cb6937524fec2c3dd05ea78cb69327f4b9606a0dc9101192f3034016d25dd18788451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ec54768f0ffa1c749393e087689fe791

    SHA1

    41e5f7a15be4d55614bb9147bde3875c36156a77

    SHA256

    a3d11853fa2e92f2d6d44ddd5dde2cac4fccedea1e77edef0b8d90afeb2c5fb3

    SHA512

    64316a52e63bd7947b8d826a6adf521802671e9ecad42c0a685f392ea26522319f45e40fab43662b504e7f6cabfc756b9724fa12f0e55dfcc2568c49113ea26d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5292c5bea8a634dc2be01539e04bc98

    SHA1

    738d2248b94cb073bca81ac4292eb52050adb8fc

    SHA256

    2fecc64b4df67bedb5790cb623d0735e00a670ebd2e1265372b4ca8b8f51d714

    SHA512

    7f8c5814dd8e92b3bc27788bd576d16a5e3c051a7b843e234fb2488fc4fc2648ecc00250d11fdf68d7f10c125bd819346e003049754f90477a42aa47b643a840

  • C:\Users\Admin\AppData\Local\Temp\Cab2A8D.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2BDB.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a