Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 20:17

General

  • Target

    4716ec90fdc9a44abad9a5d1b0711238.html

  • Size

    3.5MB

  • MD5

    4716ec90fdc9a44abad9a5d1b0711238

  • SHA1

    8c9fd7e3daf6d4936cc6d682bd49f2a5ef0becca

  • SHA256

    de9e4427b122a34b4d0afe1fabc1d01f46db43d89b8a5ddbc3b1db3877ba9259

  • SHA512

    42cfa7b3631bc59079f1c0b30da9efd9a9314856ab3c8d864fd4d02b3a5aa0f178be5e48758074324f11319c1e88059ef8a0c1f5f45543219bb0660be15a3d9e

  • SSDEEP

    12288:jLZhBVKHfVfitmg11tmg1P16bf7axluxOT6NG5:jvpjte4tT6Q5

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4716ec90fdc9a44abad9a5d1b0711238.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3224 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      PID:4148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads