Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
26/01/2024, 19:55
240126-ynh2caegar 126/01/2024, 19:53
240126-ymgf5adcd6 826/01/2024, 19:52
240126-ylfs7seffk 826/01/2024, 19:49
240126-yjnq2adbh6 826/01/2024, 19:46
240126-yg89ysdbe7 1Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
26/01/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
BLANDITIIS6.html
Resource
win10-20231215-en
General
-
Target
BLANDITIIS6.html
-
Size
40KB
-
MD5
0a940d1bfa4b0834a4f2af9080578372
-
SHA1
f4e05a2b419d4caca71747dd174fc77d04821994
-
SHA256
f372c5b6992032699ef6c66177131e6aecd62431cbca53fc9c2daaaae7650199
-
SHA512
1532d9cdbeeedc98eddad3b878dbb98b5b506013c353619cee9020cb7f1e954521375277d7daac76d6eb642ea5180b942bd88f02cb72e639c46677335f654aa9
-
SSDEEP
768:MBL+oAZizxCmaptUR6lUYWGLYrpVKS+3xVvMFD/ajVmUZPIzN:k+oA0zxCmapioerpVKr3PGIVmUGzN
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 19 2884 powershell.exe 30 3716 powershell.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4216 ipconfig.exe 1560 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31084689" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFAAB6A0-BC84-11EE-B6D8-D2C718C3607A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2216149249" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "413080424" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31084689" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0083f9749150da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d0b8869150da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2216149249" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2216305673" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "413063830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2216305673" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008a8d4a6f46ac4f46b2928f563a6832ed00000000020000000000106600000001000020000000abc658e06c810099d0ceda8e22f6237918f8f54edd5fd43acd6f428affd33dce000000000e8000000002000020000000eac31dd056fe70645027c227fbd3e47fe6bb5d95a01f30ecd038fd1330fbf5d4200000005cf95d606e81391b7cb92ee26619cb1462dfb99fb469282951129318c0570ed940000000d9069b9e4ccf9fc1e8c8b04a4910fab40b371ce0933971c4f7dfe9db335a126ac0b96802c818b9cfeb80a367b48246a91481548d9e1972fb7d45a2fa553f5332 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31084689" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "413112416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31084689" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008a8d4a6f46ac4f46b2928f563a6832ed0000000002000000000010660000000100002000000031d57d9d568842e6d545320b51e10afa70a0d30a3cb61eba003f46b63387f05b000000000e8000000002000020000000697f5b03170778627c6ed634ed669e05583a119dfdfbee0c6b518bfd504bf63e20000000386aac52f6a70d82484054aec63275c4aa757add528ed1880e6cceabfd16da2640000000d25a4201bb989221541261558771ad7334752dd17a921dd421ea1d869815c47f5d0348a70f412759665eee1694ad6361b36743bf5818b8b88e509dfc8964cc32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2884 powershell.exe 2884 powershell.exe 2884 powershell.exe 3716 powershell.exe 3716 powershell.exe 3716 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2884 powershell.exe Token: SeDebugPrivilege 3716 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4912 iexplore.exe 4912 iexplore.exe 3888 IEXPLORE.EXE 3888 IEXPLORE.EXE 3888 IEXPLORE.EXE 3888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3888 4912 iexplore.exe 73 PID 4912 wrote to memory of 3888 4912 iexplore.exe 73 PID 4912 wrote to memory of 3888 4912 iexplore.exe 73 PID 2884 wrote to memory of 1560 2884 powershell.exe 78 PID 2884 wrote to memory of 1560 2884 powershell.exe 78 PID 3716 wrote to memory of 4216 3716 powershell.exe 82 PID 3716 wrote to memory of 4216 3716 powershell.exe 82
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BLANDITIIS6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4912 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:1560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns2⤵
- Gathers network information
PID:4216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5b610bd5c61e2121914699e4b6cb9f7f4
SHA1514f5ad7770f18e1c5b62253d95d6aa3c63c83ee
SHA2563a418958f81aae04aa13719238c42d24adc5258b95246b3df0b32a1bf7676b51
SHA5129ebb50a5b4942dfbf1a037e8a1b6308502d5bd337abaf90cca0d44f3a88001b25c6f82787f13b2d5a6f2bcb81209f831c16422d4c1a6cb6e07d55e8dccd7b3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5eeb6157238fbcba4665443d262994faf
SHA1b4ad434b6e960cc1f54e5b3128eed1b55f2c17e7
SHA2564f75215b6e33ceb476257bc7639ea54edd1b6f7c999dee9ec21fa0c04fa1f83b
SHA51205c1f2670e1c935d827040dff34d1f1ddd49d783948a69a2e3490754f41d1aa73594278f5547690aca7ac24b2320c3d258cb8d99b83e51f328df74b6add9ea04
-
Filesize
3KB
MD5f7f60fa7ae32e447243a32a524f645ee
SHA182afcad59dcc5857601a9aedab68b6149c73ab8a
SHA256a210fa33d626904af6bf377eb4366c82166c86a0bb48ecf1a1c16f435aecafee
SHA5123c42d7126ef60868dd8e2a7a3eee1253e4845ac3872bc0f9c62f88194b7b2d5a2193f3a29f2278464afc11d0848f50e7f69695b8540f0887c195c08b766cc617
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
539B
MD5f7bb2eecad75e51ece4ab9ff6230a2ef
SHA1ffeef7fa38cba787f8ec94a46f7183a2e3cce350
SHA25622eb0ca26ff011a54302ed810599bbed4a5192e1451fc3c75e49be6a752fdc9d
SHA512b896087ae4e1847804d9444c5c7a2607ba0678c18afafb0b5c9c3260b8fc7eafbbcff6690ae46c003e0531f074dc13dc9a41c66ee3fd821f453a85b39e2e5bfa
-
Filesize
3KB
MD57f4db7dcc765d94f93dde4e5dc6535c6
SHA1582c4c174f2a4ccc6213247fa17cd6ca577e4eae
SHA256216f19bc36ab0cf62a865a13763f80178c7dabd1cce3e73f08bd9a9eb2391074
SHA512359c38fcf0e4200188127967843b24a4f5d1edebf5699e228c2613447fbb79ad376ef9f99dd981903fbc03f60d8abe6b9591c7e9463321a562819062a8705c29
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
352B
MD5d8c27b5afd98f840d7a6181d72a62f41
SHA19dad58054096b2f91b781049bbbd74c6c4744713
SHA256640d7055cdcc3ea78d0360f434827c65ea39661f9b102fb5c727821658dad0ab
SHA512b1a0bdfa5babb12653afb141cfaf846af6c11d8e05989ed608ea7f9f329abf34e6a79f25e3a66ec6bb614f22b0e8448772fd378bf2d3833456a17e98514950dc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize5KB
MD5745afa130b9bfaf7310a51970d04a1ce
SHA16c99d4ac77351462d3015e2b57887e9ef6e67f03
SHA256dfa3f3d4582765f7db6d06d3569cb663b8b552f29ed35c501c6290e5a5c5ba06
SHA512898659c89904495f0e3c4d63ca2730969b2675ad4b1c73973dbf9b767925f8291ac65b192e9151ee478be5d2385482438742448d60a58c3218efcf3ed8182e03
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize5KB
MD5b8023c9157b82e9c1cb3ae59f0a5fbfd
SHA14360dbf83321279f7c132b1b46608c742b799cb9
SHA2566b7eb6ed52457f86c1786612ff6ded5f177cc1d2b6ccabda28d0106cebb05629
SHA5124bf4785b669b02d4d4f4259855cc131602664efe245bb3451c021934ddfc680b1ead5b345ea4a4b0026775386b03fde62e25e2bee6d24a7acf93a5337a3776db