Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
29/10/2022, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
2116f6c2019f8b77ba449b4693ec857a825651619d1b2f6c0a1b2f471a116015.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2116f6c2019f8b77ba449b4693ec857a825651619d1b2f6c0a1b2f471a116015.html
Resource
win10-20220812-en
General
-
Target
2116f6c2019f8b77ba449b4693ec857a825651619d1b2f6c0a1b2f471a116015.html
-
Size
6KB
-
MD5
61e28d677ddbd68d2da0772bb9b42841
-
SHA1
61594a5f498bef3724036f4cd505cb0f0c414b35
-
SHA256
2116f6c2019f8b77ba449b4693ec857a825651619d1b2f6c0a1b2f471a116015
-
SHA512
420032e703f5f015b75aaeb32593dcaf33bfb79aa5d0e3cfcc507c9763b3fc24c2a2c0a81365b51d23c562d40c5b699f8bf185ef8ff0675249c2f67a7555b703
-
SSDEEP
192:BCgUXmXbXqW0N0v0CaBz0wY8yr/kf2jRnQ5/e:BIIr/kG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA4E9070-574B-11ED-98FA-523C7D4F90F0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 3832 IEXPLORE.EXE 3832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3832 2700 iexplore.exe 66 PID 2700 wrote to memory of 3832 2700 iexplore.exe 66 PID 2700 wrote to memory of 3832 2700 iexplore.exe 66
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2116f6c2019f8b77ba449b4693ec857a825651619d1b2f6c0a1b2f471a116015.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD54f630c01f9bf4c57d049a46ea616203c
SHA1a2d06f097a95d9096f7e381d39e982c0c29aac25
SHA256217bc1b6fd8b9b5987d428f164bde885ce60d24db297abd86c177e8595c30793
SHA5121ae68ac255fe9b2c517425e8642fb630c178ea261e6e844fc27d7a9f8d3e6c92da594549284622aee09b96540e9fc6086fa32ba7f66c794c1c983ed7c526af45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5c6037832b89360aa32b3deee055cfb02
SHA161df33dde04fba87dc9fa02a196d2db3a306c8c6
SHA25616978f8f6e799bb9987fde5edd3bf2c102ac14755f228f6866dd71308dbdedbd
SHA512bbcc2c6abcd898bb51198b7d20bcd2f5e96635edad8ff81151cc5da145919ace588ae6ce21ae16a2210903a4f5c3d4a518cee5d992d087420fbe9e65f48e660b