Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
248ae43317fc0ffbabf0f6be4e15b719.html
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
248ae43317fc0ffbabf0f6be4e15b719.html
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
248ae43317fc0ffbabf0f6be4e15b719.html
-
Size
144KB
-
MD5
248ae43317fc0ffbabf0f6be4e15b719
-
SHA1
82a2f623c173cc0f4de0f9e97623f6928b95e2d6
-
SHA256
36f632f2a181e8a2410aa7710e1f6e928e381442721294e14c6c0afc6ffdd0c9
-
SHA512
38237d0f0f7e462e8a6872f3db5f65e49fa83fc6323460455699803396a0a24a46deda8d4fe970df5343825fdb1cb717f61bfb2be976a38660260f0ebf8940df
-
SSDEEP
3072:DzUcjvG8rMUcXmNRS7jy9/g/cq8nWX9+8H1O:DhGXmNRaO
Score
1/10
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7D1D8DC1-AB87-11EE-AA35-E2269387CB8A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5052 iexplore.exe 5052 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4648 5052 iexplore.exe 16 PID 5052 wrote to memory of 4648 5052 iexplore.exe 16 PID 5052 wrote to memory of 4648 5052 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\248ae43317fc0ffbabf0f6be4e15b719.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5052 CREDAT:17410 /prefetch:22⤵PID:4648
-