Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
61c9388e95dbe700d371cadd422f0d1d.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
61c9388e95dbe700d371cadd422f0d1d.html
Resource
win10v2004-20231215-en
General
-
Target
61c9388e95dbe700d371cadd422f0d1d.html
-
Size
1KB
-
MD5
61c9388e95dbe700d371cadd422f0d1d
-
SHA1
0767a21162b89dc9786404509fa670425198caa0
-
SHA256
202c405e82abe76b9aad1f0cb1e94fbd857c6fe4d11e73554c927a01457b5056
-
SHA512
494b506601defbdccdaba53459775f00a10c3d8c099c0d666a6f9c5fb1da24fec5be9b860484e4f219dc1a6fff19d2d59c82f4176e2e18af0258d5b228ce345f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{33CDD13F-A169-11EE-B7F4-42E20219F0C2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4636 iexplore.exe 4636 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4688 4636 iexplore.exe 33 PID 4636 wrote to memory of 4688 4636 iexplore.exe 33 PID 4636 wrote to memory of 4688 4636 iexplore.exe 33
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61c9388e95dbe700d371cadd422f0d1d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4636 CREDAT:17410 /prefetch:22⤵PID:4688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD53969b3d3910063b2ea89e78caf54ddd2
SHA19a2c35ea3e0a47d88b860a24308cdc2cf23af8d5
SHA25605b990508145c40f5e7238b0696a0e15bda306f901d985f38ea0dd550b7e2fbc
SHA512c37a1e55c019516cbcf79658fc12a61fbb1b8c6ea094775bbf06522a88ddaafdc8c3e503d837c223d2a530fbb939607d443c652668e66e0b84307a267b0b9547