Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
0eee32a7b2a282d1df82a5fc5115d592.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0eee32a7b2a282d1df82a5fc5115d592.html
Resource
win10v2004-20231215-en
General
-
Target
0eee32a7b2a282d1df82a5fc5115d592.html
-
Size
430B
-
MD5
0eee32a7b2a282d1df82a5fc5115d592
-
SHA1
165a4eb010acfad29f2f6c81feb99e3ba20fa3f1
-
SHA256
4722e64863c9e65e332c9bf257a5537bd0f004f611b5327475fb58ee5aefec7a
-
SHA512
aa0b5da90a0679ef834ccbb9f606ddfc83e8ae5dba23ced6067e54debbfe9d970e4d827ce8f7fbd880db50c438fd5df556066c156d83610b3d7c6a4706d63685
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{94271D2A-A2B9-11EE-BD28-5A16FF4F52D9} = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4024 iexplore.exe 4024 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4024 wrote to memory of 2136 4024 iexplore.exe 18 PID 4024 wrote to memory of 2136 4024 iexplore.exe 18 PID 4024 wrote to memory of 2136 4024 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0eee32a7b2a282d1df82a5fc5115d592.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4024 CREDAT:17410 /prefetch:22⤵PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
1KB
MD59328c33c209399c9506d5926f8fb162c
SHA11e8dab011288630262daff679ac3b8eddad03e91
SHA256897bf34b878cc8f7886bb3d08a50f7dd491d06fc3488b89b763d8d02260f0eb9
SHA51272a92a702e179dc600143bc4c4cd16fbebad4a2ee266239e6650d7ba196b1855f1ab032963dc0d34c060324886247a4a3bf3d8f936e3793fba0f0b1dc7ee2131
-
Filesize
5KB
MD5d41af0a4a5b461dd3b4ee26c420035a9
SHA1eac17f7ec42e310494c0246eee564ec986a53755
SHA256c76e47ecbd42433f4a4db2e1962cb8e6f78418c78606f45671b0ecd922b0302c
SHA512c77a62d297205ca51bd6ed2e29a3a35d5ed3cc182ccc7b245d28cca28391e58730a189d492449d5a6aef3fd44a3ec473ab8e45339f510cce30aade9947e4aaa2
-
Filesize
1KB
MD5c025c0c0d28c57d952fe785968cf46e0
SHA1a1fced126dbfd472f4b5c11e406154b635d4320a
SHA256dc204676a056d3e82d637f6b97c8c29b9f5071bf354a177cdcce094c2b07abe9
SHA5128c44251404f29b1bd886e271598eade279d7a5e5640d6cbde886c5ddf386243f06c62ac77c1da0bb82de4ef11611cb3765da90497b8dd7afff132eabcaddb7b4
-
Filesize
1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c