Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
0b45a6c3a508783037581f8a67ccf597.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b45a6c3a508783037581f8a67ccf597.html
Resource
win10v2004-20231222-en
General
-
Target
0b45a6c3a508783037581f8a67ccf597.html
-
Size
14KB
-
MD5
0b45a6c3a508783037581f8a67ccf597
-
SHA1
4744084beedfa424b0009b1b5bc97e0dd1bd1d1c
-
SHA256
f810d0628cba49bf216fddc58e8c2ad24c4b9d93f2870f315fa6af512d9cc59c
-
SHA512
1b565bd45785385dbb016bf30dc7e2432b31713fab753af36eec4324ca30084c36f77baab2f7a31c8fdfaa2c3e918e9d5884b17d9ab8eec2a66cb02312601b41
-
SSDEEP
384:Fk8g/eKXilb3hS3Ph2ET36E8IxMpoMjvFiTk8STR+8tC:bS03w6E8IxCoiYFZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{D10CF63D-A72A-11EE-A0B6-766E2D171A79} = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4064 iexplore.exe 4064 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 5036 4064 iexplore.exe 16 PID 4064 wrote to memory of 5036 4064 iexplore.exe 16 PID 4064 wrote to memory of 5036 4064 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b45a6c3a508783037581f8a67ccf597.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4064 CREDAT:17410 /prefetch:22⤵PID:5036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476B
MD5d2183968f9080b37babfeba3ccf10df2
SHA124b9cf589ee6789e567fac3ae5acfc25826d00c6
SHA2564d9b83714539f82372e1e0177924bcb5180b75148e22d6725468fd2fb6f96bcc
SHA5120e16d127a199a4238138eb99a461adf2665cee4f803d63874b4bcef52301d0ecd1d2eb71af3f77187916fe04c5f9b152c51171131c2380f31ca267a0a46d2a42