Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
75180d8a4ebd1ee0c420f98ce51fbb66.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75180d8a4ebd1ee0c420f98ce51fbb66.html
Resource
win10v2004-20231215-en
General
-
Target
75180d8a4ebd1ee0c420f98ce51fbb66.html
-
Size
57KB
-
MD5
75180d8a4ebd1ee0c420f98ce51fbb66
-
SHA1
12a8695510541924f58f9bbe535bdcf16021810b
-
SHA256
dcb7c2babf04ccfd767278fb6dd64958093c6660b0a288397a01a14b4ab46550
-
SHA512
ee08fd4f5e83d3c725c05887a888b10af1b92b0aa10d41e1dd390de0bce8d10436cf0bcfe40324c563309e93aeca5ec38c90a9a780c12e4e88a2141f86f994dd
-
SSDEEP
1536:gQZBCCOdm0IxCKfoXfLfc8fqfufhfsf58f7f+fQfHfjfff/fMfwfZfcflf2fDfmJ:gk2k0IxUjbymJESTmo/7nHkYhkd+rejF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8C427F1-ACB3-11EE-ACA7-CA8D9A91D956} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2136 2028 iexplore.exe 18 PID 2028 wrote to memory of 2136 2028 iexplore.exe 18 PID 2028 wrote to memory of 2136 2028 iexplore.exe 18 PID 2028 wrote to memory of 2136 2028 iexplore.exe 18
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75180d8a4ebd1ee0c420f98ce51fbb66.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd57c3b4fc838f8e0214ac11b4ba1f15
SHA1ea1037c0f5b9dd6ea4a86f45ba048bcf9102c7d9
SHA25698112aaa5c1015d0fe7ce13842e6d8d1fbd4bf0c83e3b895d756083f916101a3
SHA51251e7ca4fea36ab36821a0cc6eac6dbbb117cf0f9de94cc50137ab1006fa5fe144f25fd226d161fcc89179ff0b81c47050fef0b56e03e879cf5ae45564aa09aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551d5ca9af998dbc7bb542266f1dad0b9
SHA1aa980a756204e7c89a2d6d4d5b6965cea511bf7f
SHA256c7ebc9c43620fa765d47e64abb460664a49041e083fffc0a803ed383502c8405
SHA51276cd94edd93402e29fca5f18546dc3ac7068198f35ba49184acf6044b7a1b1660b462ff954c3b8adbd6a803cd4cedb1d8c6a755cb233f5bc9aac4ccc1f5855c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53525ffde054938bd2bacdc19662316bd
SHA114c7c27707885c1fdf5fbfbd81444659be0b6e1e
SHA25607618694d4dbc724e8675125eb0d54ba722a480fcfdba23de5334d75abe21937
SHA51293c04efcd7b15fbb61eed36377ed541764dffdf4ae95fc34c5143355ce7b85da477881c3afdd0cc14b9f6047b5f929d3f7613bb4ef30412db669b3b9d65b783f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58af946fbcc844ba3bae6e603519b6c0b
SHA1c5733714a81575adcc6fc681b335b916d85f0575
SHA25635588b017d5960178fcb6819909a4fae0c9ec13bf3b15eec8b0456004b0228f5
SHA512120d5608dfaac1674380cab80d6c94da27418803bb31c69be5f4d1c7ed97bc343b86314467f18093f72da5fd9e8091da70f400a453f140d1641d566b815a5b6c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
126KB
MD5c5120e46823236c95b9c80892b61ecf7
SHA119f60f1fbcb99ceb0cf5b0b6730cbcd83e50b882
SHA256e0cab9e46d088358b023b3d02a3f0570c25935f695aded476acc0da45d363e50
SHA512b34276570529d1bd2778362695087905fe8c582dd6f435eaac0db3d3cd0dffee2ffba92051c6b503863d89fb85c4bdb613313cff67f9f636801490caf185714b