Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
25328dcf02351b64ba6bd2704fe56d09.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
25328dcf02351b64ba6bd2704fe56d09.html
Resource
win10v2004-20231215-en
General
-
Target
25328dcf02351b64ba6bd2704fe56d09.html
-
Size
28KB
-
MD5
25328dcf02351b64ba6bd2704fe56d09
-
SHA1
eb1bfe6aded335f130a8b1ed8fdf7e7b6e8def93
-
SHA256
b26cfd0a394b57efbde4242c0c74cd78cdba361060159635999128b5475c17ba
-
SHA512
e0c039e2f34e965e087ad2ccc3830742cb333c01e20b5b5ee64098317fb8fa00e81f230fd2adcbac321295e29708d61be3dd17b7c262a48ef3527a2f70c79669
-
SSDEEP
384:FooSIBNff0PtV3T2HNrGyU+9vLlC1AUIHz2ZXsbGHlVfH7CCD8YgUAX0kMfmO:ejSJ5jCK2ZXx88k8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5070F62E-AB9D-11EE-9ECD-CA152A8DAB80} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3492 iexplore.exe 3492 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3492 wrote to memory of 4412 3492 iexplore.exe 16 PID 3492 wrote to memory of 4412 3492 iexplore.exe 16 PID 3492 wrote to memory of 4412 3492 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\25328dcf02351b64ba6bd2704fe56d09.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3492 CREDAT:17410 /prefetch:22⤵PID:4412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476B
MD5d2183968f9080b37babfeba3ccf10df2
SHA124b9cf589ee6789e567fac3ae5acfc25826d00c6
SHA2564d9b83714539f82372e1e0177924bcb5180b75148e22d6725468fd2fb6f96bcc
SHA5120e16d127a199a4238138eb99a461adf2665cee4f803d63874b4bcef52301d0ecd1d2eb71af3f77187916fe04c5f9b152c51171131c2380f31ca267a0a46d2a42