Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
26198fd4e6065c452340db2472646c6f.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
26198fd4e6065c452340db2472646c6f.html
Resource
win10v2004-20231222-en
General
-
Target
26198fd4e6065c452340db2472646c6f.html
-
Size
18KB
-
MD5
26198fd4e6065c452340db2472646c6f
-
SHA1
b39c7a4bccfa44478109ab8201c36646982e5206
-
SHA256
ac2a391048df80b4ec9aaff42da6c3d77fd34ea4e6400eac265035a3a8114b39
-
SHA512
e212c7fdd95dce18d3810c4f4c85c1c0d41adc7431e2521ed817239788e40a3c64a00c0a45166e790a90eefc8af579e0c2837d65ea62e048ae672599fe6adc12
-
SSDEEP
384:FUAiXxCxBxRfxMx7aFBfJophz3pAMtP2eDGM1DvtL6TI+Qga:iFXxCxBxFxMxGFxJkhz5ASP2JK7Rr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{581D3CD7-ABAA-11EE-A0B6-6E89F5E0ECB7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3504 iexplore.exe 3504 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3504 wrote to memory of 208 3504 iexplore.exe 35 PID 3504 wrote to memory of 208 3504 iexplore.exe 35 PID 3504 wrote to memory of 208 3504 iexplore.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26198fd4e6065c452340db2472646c6f.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3504 CREDAT:17410 /prefetch:22⤵PID:208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD55d3087866f8a7adb7028d2104bf82710
SHA12e26f854c8d2735e596189d09220a3c9d74fdefe
SHA2566f12e78be17dde8e1c1f0de5d56c6e915af32a90b60efa74a32abd60dec4e237
SHA512808f6ad3d91246408d596030071700a6b7a67deebef06e8d02a1f2af11db2604f66bdd52a2f3f1c40254e082cb41c15384b5de560a73c64e0544b0eef6f1d9c8