Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/04/2024, 10:01

General

  • Target

    OEBPS/05_furia00-20.html

  • Size

    7KB

  • MD5

    7d94f321d405358a159e99d263feb115

  • SHA1

    b3f2f880d732e1ecad097820e7a813b8c06927a8

  • SHA256

    a45be2c5e2854469d267b407c11368aaf92b0bcb755965f3df938e0ee8e76458

  • SHA512

    19feec82a43488b4667b62755739ffb084e45f3414fa765d24cf1f1419c0d6dacef308f0a53b6258a7da67aefb1c80428bcbabca4504f89b686188c60f3a3565

  • SSDEEP

    96:LRMxpXvsBPb9ccO+I6UABYuTG+rgQrxvLi4K24t1:dCv0Pb9rOIUAB1xvLvV4t1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\OEBPS\05_furia00-20.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b7e9502810c6179626b2f8b4348395ee

    SHA1

    57b01459fd6d1fd2eed8d1110a8420669c85dfbc

    SHA256

    1109971fefeb14fcd30c4353fba55fad7eabffd2494d2dd42c21b79984a8927e

    SHA512

    6867d4424d8ea2867370c66d27836c7dc3a364e3cd92778810785b55685a7f83ffe7c5218cb0d9f61adf72da7e205e2c19aef1aa13f7d3fcd0513b37391a40b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bbb7eda6eb1cee80de0795d18df48114

    SHA1

    e4ed9cc68eb6124542af3e9342aed37e083c4895

    SHA256

    6062bf0ca009799dd50396799b7df173fade49f1d3af2c124ca670db0c0cf1b7

    SHA512

    c622ca006be0c0dedc671ee38f4367e96288c632df23f49d166f8514f718e983598a985a2c03d2d8010e4ff4581878c2d7c38266127710a9e6a3cb71f143cb5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68675a8c1faae6489d5870820999a0ff

    SHA1

    cd7597118f17f08bd9c1e690bfd32ae534e6ffb7

    SHA256

    86b48494aee1157579ba0171ac0de955cb24fce8146e32f6fc79767d30022a3a

    SHA512

    7e10f03844aa60f07f66f4f3c35ec551efb343241b0e2513eb37df17233993bc8739ec32d713ebd7fea3f8b925626f00267116215323f446825f51b98bdc0a72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d85cd3655c929fcb5eb11ae63fd60b73

    SHA1

    07126ede5b234df399161691f09666818f7f23f2

    SHA256

    f05dcbb30f160a398b31fb97b8ab5beed133a02ea2da9c7af65c899858427156

    SHA512

    7b23047d501b405b884588c34c08dc659fca03caf811db4a7c0ec39b1f56e6cef9829b84207e6a4d52600dc66b586827ebcdadef08c6a3bfaddfb2dc3375899a

  • C:\Users\Admin\AppData\Local\Temp\Cab3554.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar36E3.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a