Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
36f7562f6ec0cdaccc6cc056a6e9b540.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36f7562f6ec0cdaccc6cc056a6e9b540.html
Resource
win10v2004-20231222-en
General
-
Target
36f7562f6ec0cdaccc6cc056a6e9b540.html
-
Size
57KB
-
MD5
36f7562f6ec0cdaccc6cc056a6e9b540
-
SHA1
186b27461fcc012273d2ac2ad87f059b942a81ac
-
SHA256
e232cfd84e409691319f709571826757eab88ca58bccd6c9e6db41972d7a6e46
-
SHA512
64ef0388c5029c414ee375f22f433f2e8420b1899f7eb4c412f0d713699e6e56fef6406898f53f67c1abf4851c97462d9703170425a7237518f01281ae45f2f0
-
SSDEEP
1536:ijEQvK8OPHdygHo2vgyHJv0owbd6zKD6CDK2RVroLYwpDK2RVy:ijnOPHdyh2vgyHJutDK2RVroLYwpDK2m
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{22E06159-AFCF-11EE-AA35-EA04B8DEDBF3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4044 iexplore.exe 4044 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4044 wrote to memory of 4068 4044 iexplore.exe 16 PID 4044 wrote to memory of 4068 4044 iexplore.exe 16 PID 4044 wrote to memory of 4068 4044 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36f7562f6ec0cdaccc6cc056a6e9b540.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4044 CREDAT:17410 /prefetch:22⤵PID:4068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD53eb1eecf898033820c8275f781e38d57
SHA1ae8308d3c12f687cf347ce0cc60f252768edf41f
SHA2562a8dc52e94660732672dd9aa03dc86d915729efd90ae7acd3f8071acf07d9e4e
SHA51248b046cdaba92b5a81706ddbf92113deaf88b1473f8c60e491170f7bb143a1247caa0ee259322fb7905880ea4e90376035c8cf9a1ea049646bdd55a482a45a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64E544B76338020D780BCC40A2A2B366
Filesize414B
MD57c65955400be4fdef4b34c8eb1a1de53
SHA1d0e072359fc33c3ac1793e45257fffe3f0b38ca3
SHA25641dbcadb670ae51dfddfcc1bc6ca8618b3775a4d982f7c0311c7c03f85c3b0fb
SHA5126a336ff58c13a54efbcb98648b76d30dfa7b6a477a7f62ca1164e04d37cd28d6fc52b925c573a26e04d0eefb9a4f08cde0300db1221bea6cfc8be6085670ba93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD50243ae1b09c769876669d3e4e2413157
SHA1f104d7799ddd16ae11d528fa48f74a138bd18f8d
SHA2563a63663b725ed2d4728dbfc60e378a4f02e80f2cd14b797ffce76921af6b76a3
SHA512ccb1c6df0c329ef916608f94bf5bf77492959c83281874c9568d54a43f11b9699dc121a19818deadab0d41f77438d8f5dc89f8dda524c94cf98a00a9924d3dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
166B
MD546fea924ef152bcb98f471dcf507d145
SHA1b9afd79143ae22e9f1dc3fa522341f8aaaaec606
SHA25683098672b851878e029d107f9f03b432aac6e77f0225ea3dfa87092b6f6f382c
SHA512f30b907220786881cec7f0dc001257bd8847d0620fe44db646b767364cb2e5451cde155e4ee35275b8c99db83a4628e082650bf10a7606a119538c52f75bdfbb
-
Filesize
34KB
MD514fcca324fc8f9323f05bcc0a3137825
SHA13dd34e8c1934ca54aba3f20f9eec1f7f38402329
SHA25668fd8a7f0a4c5e685c49243419b228e373ca1b8817c5544de063b41dfb02b1ab
SHA512cebe182c2c92000841dae0b8eb4b670644566458fbe0046a9de4a8dde5bdd738dee5d3e4b7e2902f635caa701fa3c96c353112b61d094888f474b2613eca9ebb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8D1Z5HG5\mem5YaGs126MiZpBA-UN7rg-Vg[1].woff
Filesize95KB
MD5dd482b790e27ef56d5bb00a5d1fcdd6d
SHA14f6d7bf62181a9d26055547a63c6ba67a5e8d7f5
SHA256923a8e3065efb9e594320e03cc5cc5e343a52e60ab2be5b717b12f000aad36b3
SHA512dd3e0e4884cf8e33bd1b0c9a7802e88e564c4fd8655d898ab1f4aca7a990b22cc46f974052d1f3c33423ff1e5559b01fbcfa9121d8d84f10b74f696b715dfcc1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8D1Z5HG5\mem5YaGs126MiZpBA-UNirk-Vg[1].woff
Filesize95KB
MD5b4f76501db86eb7c731e0437151d304f
SHA18d38bab451d52354bd5c90a674f34bbeecbed3d3
SHA256058795c57ae91386a93956ccde3b5460a120fad962c2b08ba79bbd11a9d934a7
SHA512f661eb9acc27f471912b3abfd1cac126f03f061fca805fd36c1d2e40fdf148e96bc19ed34a8b755a18463e91be66f30c9484989b22247c55b6e780d68999cd4b
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee