Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 00:03 UTC

General

  • Target

    04f59c381cbb547fc48937711dd266eab44536990bcc3099d471f43d1eb1496b.exe

  • Size

    380KB

  • MD5

    2af37e880eade257929567b95ecf53e0

  • SHA1

    5d357f2aee3db018f5d3d764029d61cc66471634

  • SHA256

    04f59c381cbb547fc48937711dd266eab44536990bcc3099d471f43d1eb1496b

  • SHA512

    e45c74d510b4410052ec89d7ecfee5d2b9785658960bd2c1041ee1049f8179052153b1acdeb6c0d53f202f0232fbe3f1f9d995a5002def49d124b82068977581

  • SSDEEP

    6144:1i8RMpCQ0TexdCoNSQwMOu/L5NY5k7paog+4gyA1H1zZsQ6psGeDkXMg:M8RMpCQ2exdCGGMOu/iQtUA1A7R

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables taskbar notifications via registry modification
  • Windows security modification 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04f59c381cbb547fc48937711dd266eab44536990bcc3099d471f43d1eb1496b.exe
    "C:\Users\Admin\AppData\Local\Temp\04f59c381cbb547fc48937711dd266eab44536990bcc3099d471f43d1eb1496b.exe"
    1⤵
    • UAC bypass
    • Windows security bypass
    • Windows security modification
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:1812

Network

  • flag-hk
    GET
    http://112.121.178.190/api/urls/?ts=2010dfa0&affid=20355
    04f59c381cbb547fc48937711dd266eab44536990bcc3099d471f43d1eb1496b.exe
    Remote address:
    112.121.178.190:80
    Request
    GET /api/urls/?ts=2010dfa0&affid=20355 HTTP/1.1
    Cache-Control: no-cache
    Connection: Keep-Alive
    Pragma: no-cache
    User-Agent:
    Host: 112.121.178.190
    Response
    HTTP/1.1 404 Not Found
    Server: nginx
    Date: Mon, 19 Sep 2022 00:23:51 GMT
    Content-Type: text/html
    Content-Length: 146
    Connection: keep-alive
  • 112.121.178.190:80
    http://112.121.178.190/api/urls/?ts=2010dfa0&affid=20355
    http
    04f59c381cbb547fc48937711dd266eab44536990bcc3099d471f43d1eb1496b.exe
    484 B
    840 B
    7
    6

    HTTP Request

    GET http://112.121.178.190/api/urls/?ts=2010dfa0&affid=20355

    HTTP Response

    404
  • 112.121.178.190:80
    04f59c381cbb547fc48937711dd266eab44536990bcc3099d471f43d1eb1496b.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1812-54-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB

  • memory/1812-55-0x0000000000400000-0x00000000004C9000-memory.dmp

    Filesize

    804KB

  • memory/1812-56-0x0000000000400000-0x00000000004C9000-memory.dmp

    Filesize

    804KB

  • memory/1812-57-0x0000000000280000-0x0000000000283000-memory.dmp

    Filesize

    12KB

  • memory/1812-58-0x0000000000400000-0x00000000004C9000-memory.dmp

    Filesize

    804KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.