Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
1712ec2b42d3c526ac1ee57eeddf32a1.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1712ec2b42d3c526ac1ee57eeddf32a1.html
Resource
win10v2004-20231222-en
General
-
Target
1712ec2b42d3c526ac1ee57eeddf32a1.html
-
Size
10KB
-
MD5
1712ec2b42d3c526ac1ee57eeddf32a1
-
SHA1
568e053fb6493aab07c839a34b413e4312786c01
-
SHA256
e8dc57b5fcd2f138a8f1618b9c61275bcf4f07429c3d27aacc88e9a808f462ce
-
SHA512
4b7a6ae299c4cbf39ac112546223a1eb0961326a53a381d2c985d1630d6c34e6746f659d76ccafc0a90d06ef3b827c6da44e5cebd79e04255251ed4a39a650f6
-
SSDEEP
96:uzVs+ux7cLLLY1k9o84d12ef7CSTU1GT/kRM1pbmhAPLlVHcEZ7ru7f:csz7cLAYS/cabmhAPLPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{64379DD3-A2E6-11EE-A0B6-667A6D636A0F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4484 iexplore.exe 4484 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4484 wrote to memory of 840 4484 iexplore.exe 16 PID 4484 wrote to memory of 840 4484 iexplore.exe 16 PID 4484 wrote to memory of 840 4484 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1712ec2b42d3c526ac1ee57eeddf32a1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4484 CREDAT:17410 /prefetch:22⤵PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eb67baf06a1d94f22035da0b59a13d1d
SHA168948612d15d7eea6fbdb80371d9c7f78ff9b189
SHA256428769b8aa88bd8024d80218948cd9af21332cc919bced628a7d8261aaffd800
SHA512cc0f8e6fc3bb6765993e1074b4e34e8de49acb9c771635c02f3471249eaddd6c5a549cf492ebddf1af2e90d82cdb3f7a603fc0443334b9d4131ca78c50a085a3
-
Filesize
5KB
MD53969b3d3910063b2ea89e78caf54ddd2
SHA19a2c35ea3e0a47d88b860a24308cdc2cf23af8d5
SHA25605b990508145c40f5e7238b0696a0e15bda306f901d985f38ea0dd550b7e2fbc
SHA512c37a1e55c019516cbcf79658fc12a61fbb1b8c6ea094775bbf06522a88ddaafdc8c3e503d837c223d2a530fbb939607d443c652668e66e0b84307a267b0b9547