Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
05fa77db3a19ded0245101487c086f6a.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05fa77db3a19ded0245101487c086f6a.html
Resource
win10v2004-20231215-en
General
-
Target
05fa77db3a19ded0245101487c086f6a.html
-
Size
958B
-
MD5
05fa77db3a19ded0245101487c086f6a
-
SHA1
6ddc139db3f5455e4266403ba87a96b07afb84c8
-
SHA256
dfa0c1601c853fdaf64f479972964dcb576b2702a055739d5f3dc286d8644d96
-
SHA512
72548655ee446b9966e17bb5713fef162b5f0dec15f37d80b0aa1ab4c873c3bdb7b30e18b6c9925613b982b4e5fdbfbfeb27c31ca3847348cb6ca272673e24ea
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{68DBFD9C-A459-11EE-9963-5EB4A22F4468} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5072 iexplore.exe 5072 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4292 5072 iexplore.exe 18 PID 5072 wrote to memory of 4292 5072 iexplore.exe 18 PID 5072 wrote to memory of 4292 5072 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05fa77db3a19ded0245101487c086f6a.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5072 CREDAT:17410 /prefetch:22⤵PID:4292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD504dcbd04f7a3cee36f311c183eed56c6
SHA19a0f49c805ee8a132221b7580dba345c7082e44c
SHA256be30c8e285a1b7919e3f474bc6c2344b30705ef2ab860b098638934bc76a9635
SHA512630d47767d6857c2052eb494553964e9055b45dcff2a49b865f7b5b871e8b38aba1c3670531fb665c44da7e281e768edbcc96fc633b3bdbd002db2ba75880f5c
-
Filesize
8KB
MD599dbce73f4a8db903caf13339825b0f3
SHA19809447de347468445bb134250823a07b16ddf35
SHA2562592f7a91e04ebf860279164b76d4ea8a09208fa25ae5c5456d4e6415031ad42
SHA512f1daccef8a2836010ba99dd39d05f1a12cd830fd51e9f843b4565c8059ff52e53876b4e283fd2c285d0a6f292e9dfedc3bb5c7bec4a657c3ab66f25955bb1625