Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 01:41

General

  • Target

    sample.html

  • Size

    220KB

  • MD5

    d5d83b39e1024ee9b59db8f01b1c1af5

  • SHA1

    ae7eaddf0e9c179fe2bcdbcbce03631a606d6fc9

  • SHA256

    250b6a14b66c9b2b3ba3d3169349d9579a28a9a6d60ccc78d167d32b41451b4d

  • SHA512

    1341fd6ebfc6c7b3713f193bcd2e1bdacaf755d52ad267cc7d725e480344bcd9e406cd0758e0717263a2fb8cd7362bcf168788e158fb574c53deb08d38aad24d

  • SSDEEP

    3072:SFX2QiQxfF6+L76yyX7yyfkMY+BES09JXAnyrZalI+YQ:SA+f0+W3jsMYod+X3oI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10c14813a5653de120459f77caaaddc7

    SHA1

    90efbc5d409071edb1698a165b1149172c45f740

    SHA256

    cf94bc9102066591a570a1da5fe22b8156e68b29e4432149779b83df703b8b12

    SHA512

    8f6987b442b50bc6a8d8c2a180419e1da92f2da6f7246b11a8b4f60e34fa285e3134ed430a97bea09ab9cfcbe8e1e0bfc4564e079f9e4dde5fe4efb8aeba1a51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29a0e21dafe20d0682074cbe931be21e

    SHA1

    129f9e2669c83ddfa06bec4507ebb7261f942347

    SHA256

    f9f07336dd230630b06db362c71d11b5bce2236515d0b293038c113bae24d053

    SHA512

    51507ff341b06d84bccfb3165503181624955bd2348936500373ab797b8bf5b41c7f9b312cdddfd3740be1b5f02e1d8ba274ad60efe107bd97f8af7c78cbb9a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    630d0dc67dcb09a8b21663af550bcc63

    SHA1

    a484226aaacda4936102099dcd87dc2b1cb77e7d

    SHA256

    f67f928ad4d91b3355d97c15cedf05947155b6ef5737f5697b6aa79ea07c4706

    SHA512

    b919d4c4db12fea6d7ebc1effa04dce3fe56bb95bd42f868e0cc4ec7c587dbd1755730a23ea256381ca5e1780bc295908167c2a6aa6bf90c867074760a450535

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ee3d9a01bfb57005347502f5ecbf928

    SHA1

    9cc22e3b8d741e45efb2ecc9f18366419519c984

    SHA256

    29fb70ac93cb48b2d90517787dcb4b318f2cad13fb3aed9389e92bf0a6b66c62

    SHA512

    e1e7b424d8fc897f372d18346dc45680b1cc3235d7407b97e8d8230705581311226c1f2187224a0b8336d7a9c305477ffbb91572fb2372a9c5418e55880021c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    970b2ec1905b6a0106d4ebbb9cf7cc51

    SHA1

    4d81cc269802398aeced9eb8f20890bafd86e01f

    SHA256

    057e096ff1d11fd8ca40e9cc8b8cea2419bd8c7e556786717de263d865d54fe3

    SHA512

    ea4d33465275c4f54dc0d863f8b3e44c7e8523c449ac7661d411c9f43b5df4ac3ab487a2c92a03cd01d6751835303dbe94d3181ba7aab1702496ee023cbd1790

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    394fc34200a58a56d5b3e1706cbc4f31

    SHA1

    8c602347b19a8b3cffd71f5d20242ccd3367e38e

    SHA256

    cb2894ac48bb271e410ec52ab1eb465759e61d751e371852c888113a11e3a2f3

    SHA512

    43bc6c8e8f0684c1e809c902a09203560b054b2142f68776701682b37480ea29fd4a54ea63aa5c10d4e02ccf1bb0b87b901d10fa7ca21a1a718075c6b39cece2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a1619de65d60e014c294356b22b8fa0

    SHA1

    9eac4ae6946f2a1048c9e762bf8b6a7f3686659f

    SHA256

    1a0af5ed7c230c6cb56328afb2a4316efa4b7cfce4e1798a03db870d7683ba12

    SHA512

    eed14a23558e79c2f01a07307e9493d552750895871b47993c454fe0d0731ba3042d194f946ab3fd731c851bdcdda07d3c2181b14d54dffa6b9965c9deea5cca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7468e75e77fd07e0d1038e5521d876d8

    SHA1

    b7a1e4812ea6c8dc70063c99741a5822ce955b03

    SHA256

    c0e2d56b2b5d25d56745b8c345e5c9d9ce1b34a574f7c8e66f66a34a4e02c62c

    SHA512

    c1a5720bb7c51b3bc54a8f1464d7fff97e6ad76621becc5210a4a221afc0b051b65726a19fdd62c27d127aa0326b85f5d80b8e183ff769bdf382762040f15e4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    106a795f552c35ffe092aa9bdf8038f1

    SHA1

    72255a78c514c895ee0144633c6fc95bff7f2d19

    SHA256

    722cef1c99a1b031a2a61c587c5d0f8e3409d386246db6920af993c59c3d1799

    SHA512

    9defec3b47e40bacac5e9f44a01160aa85a7c1aba7383f722678aea786604690fab643392fad95a1a2e9651b185db42c65e2aea90cb029d27e6befda8051bb02

  • C:\Users\Admin\AppData\Local\Temp\Cab1600.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar16F4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b