Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    211s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 04:15

General

  • Target

    DISCOVER/COMPATBL/DEFAULT.htm

  • Size

    6KB

  • MD5

    ec99f6ebbac3ae9cacb2895bca9a95ae

  • SHA1

    c0d5d4a8a4f430afb2863ad4cee6d852d724d3b7

  • SHA256

    ae21dc262a7e97d01ce2b2de3bdafd8292361c0652e0b64e459f999a4480e917

  • SHA512

    655f5910c276855a0bdfb87551f60a0861855d6e2dc794ce15412e8c8db87e8794b7d794d17e667511a47a4f1e03be86f56f3022b23556a73b797fcd3c390358

  • SSDEEP

    96:RNVACQ6CQoS4mJAc082vo8UUMl8Mhl8pAZJdYbY1Ir1EWvdQSHvadB:n2+t4ncuvwUMphlWai1Qv

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\DISCOVER\COMPATBL\DEFAULT.htm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9faf5efb4956d1226b62cef56ba6ce88

    SHA1

    2c1750837ebf4e984b9ac71f6e71ebc8fe99f187

    SHA256

    c337dc53ab8e426f7b373cfd215698cef67d33a2f0ece10c2c51a57582412a39

    SHA512

    437ccaaa287a9c3b8756268d68f0015652194a58582fa7019d3f43f209f8edc62513ebafa7ed3278f4d9b2d830a5e5acaaac52daf332a6ca0be4e6920cceadd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    625253d496fe8a9c8a732fd355dfe661

    SHA1

    ea34c77274e603a0d10ba61b180f9618f6b1a61b

    SHA256

    20b393ebdefd6f2857651d527a56bfde390ad3998110905780e8be02b5abafab

    SHA512

    22ce7178804edd125ec85c3d16fbec24ea6c14a130c9c235be0763cb15569a9775ef5d394aa4a50b8d885e418fd1b3432201b2cc4ada0aec4e52969fa37f1179

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cde2b342be38749fa88b188a41897ea9

    SHA1

    d77131d8e0288b0bcf8834820aa461a4718f22f1

    SHA256

    658f3ab69870fc520bb6d0aff143bdcbd7dff01be99acfcb46a7d94ba4cf0a86

    SHA512

    3151feedca465ad958837a7734da9127e63f564c4692e07cef45871ee065729d7bcb997996a13d691946bf8c3c30183dbbab9172350841ea4072d60b21a2c4c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef294b396babd13662a6a7ec71d212fc

    SHA1

    34a726273316d694253928bc01576e6b7e6dff4a

    SHA256

    ded517baf711dfc991b83e5544c02d687701623a1d49abc55545d2c0044b18c6

    SHA512

    28a4cdfb123fba9544056437930f438a2f93c04613759adb333afa7d81253d5f89044a7a9181bffbd73669c4fe5f1bb87d1a33a7b3d006057446960294fcd0c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5aa83f1aa6ce33763bad7a4956ab8022

    SHA1

    e5fd4f6f5f1ea8588042d0f457efa269ad03bc7b

    SHA256

    29a5d19ed19a1c2d10a8ff2e6a7f497cfc6d8428509e82a51acb8cf570aea9e1

    SHA512

    3feda117e1b7a91c9e8656c04bc559d555ae9f2a2f0dd624f07bb72f1a3da45a7270bf0a55d395fae2a65ce1fce757f108a7eac2c072786c25333de9cdc860af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06c86af4e7001de034257c7ac653997b

    SHA1

    5836a67a1167da4cf725391e50a2f842baf3cce5

    SHA256

    dda47d483f2a136dad4b96dc076a7cb27b9ee8f320f617eabf90ac9857bf4d99

    SHA512

    051e2a9954a61ab2f54db040c593b0037a182cbdd652731cd85829b62ee7c8f0e75e4b38516182105558cdfcd39eaef9d82b16ce7d7d29e2d19ab51fc8f1874e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ea7a9b263153f3e45671b3193bd2bbe

    SHA1

    c23ad606d7686e81ed6495431abe1dd907dfea57

    SHA256

    7ef1479897507673c67f6c04660b314964426cfe60ef722583747e1bf2ffaa6a

    SHA512

    d647c06d9ff6a59954b44412f3f6c60cccccda0e351fe81caacc92dbbed14c113e564ef7e0134291eb7c6b70ceeab856b07213c33814beebddd35e29093c2ddf

  • C:\Users\Admin\AppData\Local\Temp\Cab9659.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar967B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b