Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 09:13

General

  • Target

    d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe

  • Size

    9KB

  • MD5

    63eea99c62061c7fecb41dba69be2510

  • SHA1

    4ee8f644058ecbc8aa35f24e2c04cd55715df476

  • SHA256

    d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f

  • SHA512

    cc874544d535c31589b4fc9e6297beb06b81c7cdd29ca57be8ba68af348d05cba94116ad1bc62cd5304285044b2c2ff75a8f9e6ab487518a8f2892efe017bdb6

  • SSDEEP

    192:/TK291wp9TMrf6UKUpt3TFbNehAi7YBE5A:/TR9ap9TM/DphTFZehAi0S

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe
    "C:\Users\Admin\AppData\Local\Temp\d3bd86884f7216885d5b0dd653ea5ae548c78d313a27de9232d32ad5ee14812f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe http://humortadela.uol.com.br/animacao/animacao_pop_301.html
      2⤵
        PID:1032
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://humortadela.uol.com.br/animacao/animacao_pop_301.html
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2032

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UZEQ22AP.txt

      Filesize

      597B

      MD5

      6a2b16e64fc7a9678626811cd92a387f

      SHA1

      bb089ebdeb7033f77952a6b7b4ede51660262775

      SHA256

      3290593ae52feab064ced56dfdf8ac908fa0fbb88d61e6cea8dd05e5201d1719

      SHA512

      a7d2a84b209cc6d587c5b7de29bd70de500ee172e5d1961da1cf0b766e3edf6f96ab091d12e9ccaa8331f499e16d8bb07c409004958c9fed2e23d600d7584b0e

    • memory/1032-58-0x0000000075601000-0x0000000075603000-memory.dmp

      Filesize

      8KB

    • memory/1032-59-0x0000000074531000-0x0000000074533000-memory.dmp

      Filesize

      8KB

    • memory/1688-55-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/1688-62-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/1764-61-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp

      Filesize

      8KB