Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    193s
  • max time network
    222s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 02:37

General

  • Target

    0be7638ca5eaf9880e551859925f5ee9.html

  • Size

    91KB

  • MD5

    0be7638ca5eaf9880e551859925f5ee9

  • SHA1

    b3e3206bdb62546927c52b025c117ad1868bf2d0

  • SHA256

    4104f611a364ce956b6ab91d48de9170fe5ce162c2c055b14b94bad7f1d4d635

  • SHA512

    f0a44ac03435f9cca0510d462deee52883d8935028a963b62f2a6acaa3dfa899e3add17e3669a251e7f2e391a96cedea3bf433d0246da22889cbc4208ec46aca

  • SSDEEP

    768:d+wK6ACUB9/3MxueKONqLLb1MpU2Q/5Ewd3OwlTo:d+oAC6xq3Kq2Lb1MpULZd3OwlTo

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0be7638ca5eaf9880e551859925f5ee9.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4400 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads