Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    182s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 05:39

General

  • Target

    706e35f7084666251d9acb93c168b6ee3e1fba31412f7a8292752ef63ccd7a2d.exe

  • Size

    686KB

  • MD5

    af830d2376c528fba876e1578ca76b8c

  • SHA1

    54a552359cd339b79f174f13d57c7d341cbac968

  • SHA256

    706e35f7084666251d9acb93c168b6ee3e1fba31412f7a8292752ef63ccd7a2d

  • SHA512

    3acd30b66bff42640821f1f715be8b6f7cddf27be5c59938933c3b236235e0d51c3a6f0a6640c6b83ff6e4138d796ce811f7da40ee0572d7df71649e4cc2d057

  • SSDEEP

    12288:stlYXURbBg2Tfc3ilWZ0qECz2JV/fLylQwgmTIPd76nI4CtZPoqZNb2LaXaSX66D:szYXURG2fc3imzmV/jylQx76IfwqZN6i

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\706e35f7084666251d9acb93c168b6ee3e1fba31412f7a8292752ef63ccd7a2d.exe
    "C:\Users\Admin\AppData\Local\Temp\706e35f7084666251d9acb93c168b6ee3e1fba31412f7a8292752ef63ccd7a2d.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1756
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:784 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:932

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

    Filesize

    5KB

    MD5

    3f4baa1d1cdb059542756adf3717f096

    SHA1

    594245957b97ac0813f3ef5c17de8fe4c63b34b9

    SHA256

    9a64946c56d8d01d7c6a0d06152d7c7786d229746573df9d8f04f3ac18675f5e

    SHA512

    1ccfebd78ae99069459e8fa94c3d901f72f7546352e901d06f3edc59cef584683b713dbd0ace1314486704958ed5dbf81ec115d62c1d494c2d5d3b996e0a6a20

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\N33BC7JD.txt

    Filesize

    608B

    MD5

    453ef93313cabf8b643c255d8aebc3ec

    SHA1

    6436ca325d8648a63eaffee914e93b54b096382e

    SHA256

    b307d8420723ba97c455a9ca4c0a438ecdd780358a1a933cbff6e6c43596b37c

    SHA512

    d9ea375e00840028c6af3bb2fa0b8f6b0193cd99bb2c0879ff7631e6c2f1e32a5d8b4b8a0f63ca5639d5c958a2ad6191fab3a82aa3807b5368a8797706a98d20

  • memory/1756-54-0x0000000076171000-0x0000000076173000-memory.dmp

    Filesize

    8KB