Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
2f4816c7bc3a7c5390c77b8d5587c4ac.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2f4816c7bc3a7c5390c77b8d5587c4ac.html
Resource
win10v2004-20231222-en
General
-
Target
2f4816c7bc3a7c5390c77b8d5587c4ac.html
-
Size
12KB
-
MD5
2f4816c7bc3a7c5390c77b8d5587c4ac
-
SHA1
cb1579632d5342f22950f12dfcbbb027821d3233
-
SHA256
05dbff20ced6f1a53ce87c62192ab882560143a103973602e492b3370e4fd1b9
-
SHA512
92f4ca8b061de3fc0fd628f7761b643473b7aba1d091819e1a3c35aa90d8c1ea580a650bca11c05bdc7723c2edfe30e438acd2b8ed34bd96d836eab0170d272b
-
SSDEEP
192:QIEqusVyH6AWy8JPm7t1TnN9TSAb0f8a/lbpaXAh:XusVyhWb+7N9TSXbpd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8BD1C7AB-A3EF-11EE-A0B6-F2334ED3B5DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3764 iexplore.exe 3764 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3764 wrote to memory of 4280 3764 iexplore.exe 16 PID 3764 wrote to memory of 4280 3764 iexplore.exe 16 PID 3764 wrote to memory of 4280 3764 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f4816c7bc3a7c5390c77b8d5587c4ac.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3764 CREDAT:17410 /prefetch:22⤵PID:4280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c6bdda3f990d9f4af799c6780b8859b4
SHA1a621164f6b814af5e867c84e7b014695c850fc7e
SHA256bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc
SHA512955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443