Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
182b92b4f0141825ed66d7b19fb73336.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
182b92b4f0141825ed66d7b19fb73336.html
Resource
win10v2004-20231215-en
General
-
Target
182b92b4f0141825ed66d7b19fb73336.html
-
Size
11KB
-
MD5
182b92b4f0141825ed66d7b19fb73336
-
SHA1
8d85607dd8d6bcd4e353076cfc91abd088ae286d
-
SHA256
3905b82f8ca22ea4b1e535630efd9619a96809eeb898f26f2d3de8d9a5a9c3b6
-
SHA512
0a3d114f6ba7512705912149abc38a544d3cb1b2237d98cbb72796eeeac5c0073c078e46efdf75eb7e1858ded2c2708edb367adf23a1e36d804cc1f4402de0c6
-
SSDEEP
192:mEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEErPU0tL6AL0AKtz:mEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE/
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BD69D39A-A518-11EE-9963-F21AB124C203} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1752 iexplore.exe 1752 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3024 1752 iexplore.exe 18 PID 1752 wrote to memory of 3024 1752 iexplore.exe 18 PID 1752 wrote to memory of 3024 1752 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\182b92b4f0141825ed66d7b19fb73336.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:17410 /prefetch:22⤵PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5d854bbb2246d993bd1f8687e79493f60
SHA128fbae93bc5e4e99a6c905fdda488be72057c307
SHA256707248d75606cc53aad966797dc2cc86997d1ea1a74b1c99b9191716600c74e3
SHA512ba4e7ef0a590c84310fb36ea64202cf821058eb7bd52ada1cc9fefff544b7500bf54a8ee43ce80b6cf8989071b0deaf2bf9a50c8063c192f24063f318585c3f2