Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
0b18896d19db83bf0f99f29e4be8012b.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b18896d19db83bf0f99f29e4be8012b.html
Resource
win10v2004-20231215-en
General
-
Target
0b18896d19db83bf0f99f29e4be8012b.html
-
Size
432B
-
MD5
0b18896d19db83bf0f99f29e4be8012b
-
SHA1
866871eae71c0a969e028dde5e57c4416bd9d23e
-
SHA256
33315974affdbe446da9062319ecddc68f277249f49152aa2fd2d0f27ac0d632
-
SHA512
98ea3723cf5b21b06604ba6c900485c57a4d9a0e3d27904eeff160638e29760815625db03b1f5398e7179926a1c12abd24d8e724be6dc7488e9bc11834e9a5c8
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2A2F7ED6-A728-11EE-9BE3-5A2E32B6DBC3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3844 2116 iexplore.exe 50 PID 2116 wrote to memory of 3844 2116 iexplore.exe 50 PID 2116 wrote to memory of 3844 2116 iexplore.exe 50
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b18896d19db83bf0f99f29e4be8012b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:17410 /prefetch:22⤵PID:3844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
4KB
MD57fb975bcb83af1efa174a66f4e21b41a
SHA1ba32edb6e16a963b2f2b6161cdc0c9a320afbd62
SHA256bc8567b8d15ff57eb8ef60de4cba091e4bdca5118b0b444241cc9697c6eb2e5f
SHA51271470c2662ce5eeb7c2efa38773e1f77b8a798c297ab3b53d3062f0a84dd72953287157b71a337c26abfcf60b4928c78090400bf927278df05e7985baa88f0d5
-
Filesize
2KB
MD59871ff9336b4c07e27bc9774a00daf7b
SHA1e88539c8cf112193ecddb8529074efd97065a0fc
SHA2566cf65f7a85001cbd1b111191891129be8fe98192aed8c8cc36f462022ea6b30f
SHA512fef0761646324079921ef3f6cb086317d411e9432e2b6d09144211efaee125c88b4ebe4ada9fbb18e70203ec8e16f08431bdfdbdb448ee2ef2dac2c25751c983
-
Filesize
1KB
MD56401c879e687886187c9929843c46016
SHA1105978fc9843ee49f25f91e9df0f30682c182d07
SHA256a34a4cdcad1f681974d8ffcefa66ac58adc5e2cafb623bbe9e90beb533b28b4b
SHA512e03691d17c4f0587065ed5a2097572acefd902f4a80be2ba52f401f5bdc913371508bca5dd05cd161d452a3b3fe64a1ec68c83cb8a88e43ce126e3db533861bc
-
Filesize
1KB
MD5c6bdda3f990d9f4af799c6780b8859b4
SHA1a621164f6b814af5e867c84e7b014695c850fc7e
SHA256bf1d3d4bd2bfaf7e1c3ecda4669a16a68da4c2780c49c60b09d3fbc13a1633dc
SHA512955019d37611587f11831068a20a8b7f2a51838d6c11d02c822aa752fc056ba1336ce2d8f1e7d338fee9b3c9b11889ab8c615a1f60183f27cb060b3976033443
-
Filesize
1KB
MD591abe01116ab422c598e9c8af72cf4da
SHA10f2815fe8e067d48537ad168225ab4674271fa27
SHA256b1d7aef06456fe7431124129a28f0138bb5fccfa4f4161e3087de23c005e5edc
SHA512a4d5b20c3014153b6b382c43404917bd2cb5bd2a59bb1e981f5a19eb7dbdec185ace288e9700428d24e5ac623e45d04905e706f0c45a1642b1aa6c091213c23c