Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 01:55

General

  • Target

    2387c15e599cb23223f65a307d042aae.html

  • Size

    228KB

  • MD5

    2387c15e599cb23223f65a307d042aae

  • SHA1

    bf4b610b7d09f6a8daceced5d541ac9d9ef232cc

  • SHA256

    fba4861b7979b4be297fde28d15a02fde9ad4d8869a1063f2c927d3473a12a3a

  • SHA512

    c0e488381fc39a04ec0e1f4cbbbcd92e739c7373b86fd3f81ed7a01e0bfd08eb1725adf85238d5a6455dcf9962c8c3b1229f40537fcf07601c9115ed77668851

  • SSDEEP

    3072:S38yfkMY+BES09JXAnyrZalI+YaayfkMY+BES09JXAnyrZalI+YQ:S3hsMYod+X3oI+Ya/sMYod+X3oI+YQ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2387c15e599cb23223f65a307d042aae.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:17410 /prefetch:2
      2⤵
        PID:3860
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          3⤵
            PID:1332
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 284
              4⤵
              • Program crash
              PID:5000
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
              PID:4868
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1332 -ip 1332
          1⤵
            PID:3792
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 280
            1⤵
            • Program crash
            PID:3216
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4868 -ip 4868
            1⤵
              PID:2936

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1332-20-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/1332-33-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB

            • memory/4868-32-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB