Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
29/09/2022, 21:36
220929-1fwnkschgj 129/09/2022, 21:29
220929-1b8scacad9 129/09/2022, 21:26
220929-1agbpscad8 129/09/2022, 21:09
220929-zzeczachdr 129/09/2022, 21:08
220929-zyvzbschdp 129/09/2022, 21:02
220929-zvwrfscab5 1Analysis
-
max time kernel
1s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2022, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
Claim_Copy_4958_Sep_20.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Claim_Copy_4958_Sep_20.html
Resource
win10v2004-20220812-en
General
-
Target
Claim_Copy_4958_Sep_20.html
-
Size
744KB
-
MD5
ddf5dcbc26beb02424101daddcb156ea
-
SHA1
ae8a95ddd3e694b2fa182b37bb56f9fbe27c61e6
-
SHA256
2468e9a24b9683e210b96542adf891839cece4418d1aa45b7117576971659ac8
-
SHA512
20a20b48df3e7fb93ee71f582704ae733c00616742f7b03ce063049bae77168d046ce315be874b0a4197553b3bf358107e044ad37592cbbd515cc192b8c04794
-
SSDEEP
12288:z6hZWwP5NgzdjT+Wnt4mkZK8uWpD0humBbEAEevW:u35SzdjT+1RZK88gmBbE5ee
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{97784D6C-404F-11ED-89AC-FA09CB65A760} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1740 wrote to memory of 4060 1740 iexplore.exe 80 PID 1740 wrote to memory of 4060 1740 iexplore.exe 80 PID 1740 wrote to memory of 4060 1740 iexplore.exe 80
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Claim_Copy_4958_Sep_20.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:17410 /prefetch:22⤵PID:4060
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a042902dbdea921b2f46c7d0198c9ccd
SHA1c8deb19ba5d251f44c2bbcbf52340123bc9f1da8
SHA256abbd85d1c316255702f6a692c549a64ede98dc77b2db39c562ffcd34002345b7
SHA5129a4863916f16fa2636cfdb46d7403b0d263db0b155c13264c9f95bcf87122fe5659edae41f2fb6cd7a440e0073c1a66fc12e65b1f9a6d7de3bb6825e0e6c5d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD53c345330099c3ce9b08abfc4dacc57ce
SHA1283a1d6d8fa4d61d195777dd337ed5074681ff5e
SHA256e974ab1b544072cd7f31998de47bc50bcf571937415dc07a1ffff037376b2768
SHA512fe86bb8e0faa3f001bb36212e1bdb9a0c66b921bbfe21ccde82078ad3aee196097cd6681de1fb3541ce666cae2e6398f9115f6d625749bf9ecf4dec60ebdc3ac