Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    38s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 16:57

General

  • Target

    LICENSES.chromium.html

  • Size

    7.9MB

  • MD5

    312446edf757f7e92aad311f625cef2a

  • SHA1

    91102d30d5abcfa7b6ec732e3682fb9c77279ba3

  • SHA256

    c2656201ac86438d062673771e33e44d6d5e97670c3160e0de1cb0bd5fbbae9b

  • SHA512

    dce01f2448a49a0e6f08bbde6570f76a87dcc81179bb51d5e2642ad033ee81ae3996800363826a65485ab79085572bbace51409ae7102ed1a12df65018676333

  • SSDEEP

    24576:dbTy6TU675kfWScRQfJw91SmfJB6i6e6R626X8HHdE/pG6:tygpj

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50b4829fa78222bc6bbdc96f397b5f99

    SHA1

    185304e62e8bae06a6d7b054a7916cb0bd911e18

    SHA256

    c6b719db322fc0bb1e8f3fa9cbf23ca79d1880b8adca8bbe97fdac9f78bc2fe8

    SHA512

    9090abbd66d54232eb50bd32b2230e982298d438f3e3fffe97d2cf0a1e3ca74c4ee8e1b1d93bc6cd53e6cdd668e54cede3ff64ce3e3ab4f17c5d8ef09a0f0ec3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17e3f3bab3f0fb29616b64d3940c89da

    SHA1

    56f0dbcda7698d0a3ece0e3626f37713ed1c98ab

    SHA256

    dd0a2e81f28ee2c2f3cff2d8c44b0bc1f0d6527ce915fd0929c36a2e5fef6775

    SHA512

    6ab905052c5bd6c11c101a90242910d52cfaae5f54b41d783cc1dd1412ffcd93fbb9e59c1b0f1af3d0ba5241a7614e4440a197793c106fa35ac8449ae209a1ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb3bed7242a9b9ebce1a995177b0fd44

    SHA1

    bdbf324a8acd6b505bda2d26c9fd512fcb9d9d98

    SHA256

    a5b53d921ec91d7275ff308ddab1a5a9b2a9165c0ec2002ad55ca5e7db72bf6a

    SHA512

    3d0bca56f95118af9f63ff632d20e94d892c50e188b0315025f827ba9a67afbd8cc7355e66c2866b5a30ef94a2e3903c20e64728404304645ed7e1993fcff8da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5eb7c79b9125a11b8c9e137b898e6e2c

    SHA1

    212f2b184b75f7bd881f33cb5a06ceaa02e5c7a2

    SHA256

    15dae03ef3841a121ebb7ebf6aa0fbacddc1a2b0edca830c1c6c4a0df0c2efbf

    SHA512

    f3b17c6f875305d19a975ada12c35ed80145047116f773b67618a325f6461e96c3bc38b080ab16c8f03c4595b6b94d19221dc295166da18b1dc92cb9e0e78f56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    977b02ea4b5f18e16ea9ec5f1e7b3cd7

    SHA1

    e904b259583812ef830b76a01b16009c0c0de2cd

    SHA256

    7ec65e85589485dc6a53108225b60e043781bcd1f74ba43089281f60630434e1

    SHA512

    715ab356ffef0ef7c967739c7337b855107aaf8e76194c237a2abeee81216e5341272d2c90ec312007f9f3963edfc0b02f8bfce8668c014d15be1ca427a9ac28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    068cfea5f2fc1bbe85ba196e15dd2629

    SHA1

    1f8cca1ac2ea18688fad0dd13d70d70fdf741973

    SHA256

    5a1868df289d17598e4f7fd2b74e4cccfdac1c8bd57a98893b14382adf867227

    SHA512

    79f5f623f22adee09fcfce51e132e3595948789fff7e25c25f63b004c1a3dec174ba1f182fa42d821c4fc28192f9481741155feaa907bde45641b7687ea8af93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75344527568115bab1c5231b9fed3be9

    SHA1

    79fc9b1f438cbc4d6f44ec783dbe8a0d390ee01b

    SHA256

    f896dd0bd24132873b8e430fa579d0028e5d2bec2d864a0fbda7f09ccb20fba2

    SHA512

    1fa32c30b4fcf6085a6194b5733b44166cb9f8629737d2ca691431623711b0f859e750e510b915ade3a349d75fbbbaa5a70cdc5bdcf39047d43617a011b634a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14b70bcaa3915071c4ca72e9b5a29385

    SHA1

    a154c3903edf10059b254a5d5825006ca7a72603

    SHA256

    e956b511b521e8f382e990183f702ea7e70d73fd2996e68dd38fb8e6be320ed1

    SHA512

    f741767acd9f2abc4bc4ac3958250582570198ffef7e8efdf468842d5ca50d439064cdd4751004bdf982792ee8593299d7380e89cbfd006a51fb5fe30d36cabd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89ef747aec9c662ca387af334eb3b457

    SHA1

    9cccee03508c7914410daedd102e265021563c6e

    SHA256

    4e9e3d189c0f95ea4b6772d9163582296f29e2dbcdfbdfe90cc215731b0af084

    SHA512

    ea1ca14fc5e23261e6f2100658b06f58edf91b6f57ba47d0509b3ec068a50a23b21579951e7273430d22b1eeefbe327ba7989364131be8629a54943cdee920bb

  • C:\Users\Admin\AppData\Local\Temp\Cab4ECF.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar4F72.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b