Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 16:01 UTC
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://firebasestorage.googleapis.com/v0/b/far-away-56420.appspot.com/o/index.html?alt=media&token=de08148f-e847-4428-a5a8-927b55af35dc&next=https://dawn-morning-3614.on.fleek.co/?token=QmXFRR3fkeofUy2QQaEoZMJngNiBv14VUvCDo7tTHqBrKj&ci=shrihari@securado.net
Resource
win10v2004-20230220-en
General
-
Target
https://firebasestorage.googleapis.com/v0/b/far-away-56420.appspot.com/o/index.html?alt=media&token=de08148f-e847-4428-a5a8-927b55af35dc&next=https://dawn-morning-3614.on.fleek.co/?token=QmXFRR3fkeofUy2QQaEoZMJngNiBv14VUvCDo7tTHqBrKj&ci=shrihari@securado.net
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 402aab7ba945d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31021893" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1464232890" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1464232890" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386093080" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{82598318-C738-11ED-8FFF-DAE3AE61CC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1483610197" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31021893" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31021893" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4720 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4720 iexplore.exe 4720 iexplore.exe 1688 IEXPLORE.EXE 1688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 1688 4720 iexplore.exe 85 PID 4720 wrote to memory of 1688 4720 iexplore.exe 85 PID 4720 wrote to memory of 1688 4720 iexplore.exe 85
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://firebasestorage.googleapis.com/v0/b/far-away-56420.appspot.com/o/index.html?alt=media&token=de08148f-e847-4428-a5a8-927b55af35dc&next=https://dawn-morning-3614.on.fleek.co/?token=QmXFRR3fkeofUy2QQaEoZMJngNiBv14VUvCDo7tTHqBrKj&ci=shrihari@securado.net1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4720 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1688
-
Network
-
Remote address:8.8.8.8:53Requestfirebasestorage.googleapis.comIN AResponsefirebasestorage.googleapis.comIN A142.251.39.106firebasestorage.googleapis.comIN A142.250.179.138firebasestorage.googleapis.comIN A142.251.36.42firebasestorage.googleapis.comIN A142.250.179.170firebasestorage.googleapis.comIN A142.250.179.202firebasestorage.googleapis.comIN A142.251.36.10
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request254.49.247.8.in-addr.arpaIN PTRResponse
-
GEThttps://firebasestorage.googleapis.com/v0/b/far-away-56420.appspot.com/o/index.html?alt=media&token=de08148f-e847-4428-a5a8-927b55af35dc&next=https://dawn-morning-3614.on.fleek.co/?token=QmXFRR3fkeofUy2QQaEoZMJngNiBv14VUvCDo7tTHqBrKj&ci=shrihari@securado.netIEXPLORE.EXERemote address:142.251.39.106:443RequestGET /v0/b/far-away-56420.appspot.com/o/index.html?alt=media&token=de08148f-e847-4428-a5a8-927b55af35dc&next=https://dawn-morning-3614.on.fleek.co/?token=QmXFRR3fkeofUy2QQaEoZMJngNiBv14VUvCDo7tTHqBrKj&ci=shrihari@securado.net HTTP/2.0
host: firebasestorage.googleapis.com
accept: text/html, application/xhtml+xml, image/jxr, */*
accept-language: en-US
user-agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
accept-encoding: gzip, deflate
ResponseHTTP/2.0 403
x-content-type-options: nosniff
content-type: application/json; charset=UTF-8
access-control-expose-headers: Content-Range, X-Firebase-Storage-XSRF
access-control-allow-origin: *
date: Mon, 20 Mar 2023 16:01:50 GMT
expires: Mon, 20 Mar 2023 16:01:50 GMT
cache-control: private, max-age=0
content-length: 73
server: UploadServer
alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
-
Remote address:8.8.8.8:53Request106.39.251.142.in-addr.arpaIN PTRResponse106.39.251.142.in-addr.arpaIN PTRams15s48-in-f101e100net
-
Remote address:8.8.8.8:53Request35.36.251.142.in-addr.arpaIN PTRResponse35.36.251.142.in-addr.arpaIN PTRams17s12-in-f31e100net
-
Remote address:8.8.8.8:53Request34.146.190.20.in-addr.arpaIN PTRResponse34.146.190.20.in-addr.arpaIN CNAME34.0-26.146.190.20.in-addr.arpa
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request67.169.210.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request234.238.32.23.in-addr.arpaIN PTRResponse234.238.32.23.in-addr.arpaIN PTRa23-32-238-234deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.232.18.117.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.197.79.204.in-addr.arpaIN PTRResponse200.197.79.204.in-addr.arpaIN PTRa-0001a-msedgenet
-
1.1kB 5.5kB 15 11
-
142.251.39.106:443https://firebasestorage.googleapis.com/v0/b/far-away-56420.appspot.com/o/index.html?alt=media&token=de08148f-e847-4428-a5a8-927b55af35dc&next=https://dawn-morning-3614.on.fleek.co/?token=QmXFRR3fkeofUy2QQaEoZMJngNiBv14VUvCDo7tTHqBrKj&ci=shrihari@securado.nettls, http2IEXPLORE.EXE1.8kB 6.3kB 21 17
HTTP Request
GET https://firebasestorage.googleapis.com/v0/b/far-away-56420.appspot.com/o/index.html?alt=media&token=de08148f-e847-4428-a5a8-927b55af35dc&next=https://dawn-morning-3614.on.fleek.co/?token=QmXFRR3fkeofUy2QQaEoZMJngNiBv14VUvCDo7tTHqBrKj&ci=shrihari@securado.netHTTP Response
403 -
322 B 7
-
322 B 7
-
322 B 7
-
1.2kB 8.1kB 15 14
-
76 B 172 B 1 1
DNS Request
firebasestorage.googleapis.com
DNS Response
142.251.39.106142.250.179.138142.251.36.42142.250.179.170142.250.179.202142.251.36.10
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
71 B 125 B 1 1
DNS Request
254.49.247.8.in-addr.arpa
-
73 B 112 B 1 1
DNS Request
106.39.251.142.in-addr.arpa
-
72 B 110 B 1 1
DNS Request
35.36.251.142.in-addr.arpa
-
72 B 168 B 1 1
DNS Request
34.146.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
67.169.210.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
234.238.32.23.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
200.232.18.117.in-addr.arpa
-
73 B 106 B 1 1
DNS Request
200.197.79.204.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a03e3db17abda2b8279c2f4f37ee6cbf
SHA17470b2553b06790447cec18717a4bc02a24478d6
SHA256341afed6144ebf64136cff435d5654f8525faf997a72e2492fcbc522f3858942
SHA5124c93121cdbf94cd152f6e0f602c9acd5256073536e4dad930a0e1fc7656c5a1132eef1dd53d19c16979329d46916eea454cc65e578667dc8572e38ec5c4c4d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5c382c3fda6bf1dc5636d5a73d29f7ec1
SHA1b200f52981d658dbc294f6afb6066edcf0aad81e
SHA256515321d8a9aaf8427200d100fdad88ab149e2e29122cc15b72ab0b7920949d8c
SHA512aaeb1a57d86fff837d5cd71bb3a30e2548bd7885036ce4a8112aad1a0b73a6739a87e41c87b48b91343829238b2059e8e32194bc91f28fa9bd34f7d83d3586a9
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee