Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
42a4ea47462354107011220b60ce513e.html
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
42a4ea47462354107011220b60ce513e.html
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
42a4ea47462354107011220b60ce513e.html
-
Size
432B
-
MD5
42a4ea47462354107011220b60ce513e
-
SHA1
5ad1d63558fad298eee4bd49417d66ba9654b159
-
SHA256
4c327e4de2dbf9f8723718ffa58fe71f479cd0eb89e529718401df73b4ca0127
-
SHA512
2944a54416695ad6de72303a3bd52cd7ca56c8b8a4031352ecf5473d1e912c47921ffab1c3b9e59cb94e1e7eead9e95de0206882fc0b312b3b6c2836f33cb416
Score
1/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BE5BF6D4-AB7A-11EE-BD28-6A04C5405167} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5104 iexplore.exe 5104 iexplore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5104 wrote to memory of 5036 5104 iexplore.exe 16 PID 5104 wrote to memory of 5036 5104 iexplore.exe 16 PID 5104 wrote to memory of 5036 5104 iexplore.exe 16
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42a4ea47462354107011220b60ce513e.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5104 CREDAT:17410 /prefetch:22⤵PID:5036
-