Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 15:17

General

  • Target

    sample.html

  • Size

    218KB

  • MD5

    f7eb04fbee28125ef4718e20fddaa8a1

  • SHA1

    be3b93a46ca8f49ebccde3dcb9db9eace4bac4b7

  • SHA256

    eca5ce8d562b67258f10d6cc9b75269d2b93e8fd3ca76d179e09445d695a8de5

  • SHA512

    a27280ca45ddcca9d27b38406cdd551041c6a2df640d258431a59a55407312852f297751330bd1bbb941df69280e4b6d7fd1918cde795a844011aa0cfad48d30

  • SSDEEP

    3072:Sd48T2QpeiyfkMY+BES09JXAnyrZalI+YQ:Sd4+2TnsMYod+X3oI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f7aaffc6d8cb068de0811410ab4b0a4

    SHA1

    0da2f60573d41dd20c804d05a8f71638ac98587e

    SHA256

    8d26825c97dd73519a524dfed9284c3d8cc2ecc9d3e9adb69ca5508c3b4c02f3

    SHA512

    3741a207b451b6f684d9017b2a57b36a19a05481944de4d54ff87da3d342aef8fc5d184806f6f91ae382a469cdacc6d5c4b528440db7d4d990a00ee3f39ba843

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af23bf37b341f0f8f6fe6fd57510aa50

    SHA1

    666af8a4e51fdcee8f72155f0c01df3662d66222

    SHA256

    3bf699423a4b9c1e7960943bc9f5d33a8a951574176aa5e4e71052d5b89459cb

    SHA512

    d8fdc42b230ab1f518660195cde37551c23051cc8e5e95b7d66c53a9665b00be63969d4f9a38f83c9fb3cfe0070b858c3d528cb09a6b067b7195cffc67493026

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9075ee80f342f2aec064a2e549954a4

    SHA1

    7c95200e1831705b9b14ff5100a2c2bbf4f6aed6

    SHA256

    cca1f56fee3b260bfd7cffecd137db76543e560c5af96db4437a13ceb272fcf2

    SHA512

    762d4d6a13aba5cca44841d757f6abe868f69491b662168fee087a864200cfef03f2d9e67cfe61f6464c6708f52ade668a4432544ba29c626c49d04ee928fa8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f676440ff628e2101c89dc4375e75265

    SHA1

    6bc68513d92346ae058528fa13a534be9cb10e62

    SHA256

    2cfa8be8ab18bad0d3bd699eef1bc1326531f876d69329ba7d96d996405c1d56

    SHA512

    baf87eba026ff12e658e7a05d373d5fe0f8367bc219d7fb4fa7fd3dadf0581b49b37db2f33fa5f58e8df0a12eb9424d54289bd4abc6c976906cd46242d078b68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eaef027b5a1cd5d7cfb92567a7f51a77

    SHA1

    fdcf9b47ef3b636e802f30cfd4cfae30cca70020

    SHA256

    af2a16bdb552e90b62d5af938c5946dfd25612fdc55cd4db77560f037b518190

    SHA512

    cc2550070122059d0fa21e7abee826e9e5767ce67eba0a241d84114c654cbaacda8a707031e07e5571e6ef51dc631ac765ea476567ea4191bb8f0794b7807010

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a090cc560e41a0a168d6a2f905036636

    SHA1

    e78820964994c9feae70749fcedee027d8ef62e2

    SHA256

    af3cbafbd00ea2b163485f27329bf3590c9a40a013ef22ccf6c3126968b9b1e3

    SHA512

    c1eb86a95bdf2e15f9fde86422a1328af39a6ed687aed6a60f4d9a18c48b7637bcac863997f3ff4c795b2d249641946325657fc3d7c129ca2d201682d37a1e5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ae77172f8718b038e427c8fd4422361

    SHA1

    2b65c0654b53ad9a2855bfe5a7eaa07e46c339d8

    SHA256

    710ee1f09fa2868e260a2156bf0963a6dec8e9f809836f02e22e3b0afba50bdb

    SHA512

    b0771238fde8da41433c244f9ece3a458c93064f07b61ef6e46f4debec0204e52b476ddccc1a0ea3c5999c07efaf2e15863ac47e31c42d463363b3bcbb4e1412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc1bd909137fef290850537f7e9c65cc

    SHA1

    5eea02ce0387330591ffbf2f6b3832d465404a6f

    SHA256

    5340180ae9c67342119a5e2318a8c148dfce05196e1334e3bdc5a60fc53a8712

    SHA512

    4899761a2492472470aade5247dfccd5066b5dc58569def735fa60484974651e70ab70489f1065ca1af513b8f6143b99dfff340d3300a79b1b147ee776438f5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04ee17eaba7580b33ba80fc72adc2134

    SHA1

    28d0d69a31559fdd434050ecd92273af0780c066

    SHA256

    401a5432a1ecb008066c66b5d350f91c81593a6664e8d0045ebe058539366057

    SHA512

    f4055745442e9a5ca200b879c77cd4408508be7202fef4d1b20d894995b629485b3aead4699a1a09d72c5b12c0857ba497b532428667c36fa5b25c49941f1698

  • C:\Users\Admin\AppData\Local\Temp\Cab5A60.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5D71.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b