Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 10:05

Errors

Reason
Reading agent response: read tcp 10.127.0.1:49456->10.127.0.11:8000: read: connection reset by peer

General

  • Target

    5fb1ca0150b9da7d5f0fd12efa46ce70686cedd1763426cd65152f71257f4f2f.exe

  • Size

    100KB

  • MD5

    0c3b7409b38286c761c372e26ca02418

  • SHA1

    0b83971262177a216d8143da0d3efa65daa4ec82

  • SHA256

    5fb1ca0150b9da7d5f0fd12efa46ce70686cedd1763426cd65152f71257f4f2f

  • SHA512

    96f7611e5a50fdc602e928e1e887c84fc25397a33fe331bf14aa2823783d20b3cd23be23983755a036bc498bfd39ae4c32a6d80973419025b5b131e409239c7d

  • SSDEEP

    1536:oqzKVwiVcxCfWlohwwW/64rEJ1bGzbzDxIzh4BPSgQrn/uVJojoe8qte:fKi+cxMhGy4rErqTiNuPO/uV6jowt

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in System32 directory 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fb1ca0150b9da7d5f0fd12efa46ce70686cedd1763426cd65152f71257f4f2f.exe
    "C:\Users\Admin\AppData\Local\Temp\5fb1ca0150b9da7d5f0fd12efa46ce70686cedd1763426cd65152f71257f4f2f.exe"
    1⤵
    • Drops file in System32 directory
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    PID:1836
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1556

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1556-57-0x000007FEFB901000-0x000007FEFB903000-memory.dmp

      Filesize

      8KB

    • memory/1836-54-0x0000000001000000-0x000000000101A000-memory.dmp

      Filesize

      104KB

    • memory/1836-55-0x0000000075C51000-0x0000000075C53000-memory.dmp

      Filesize

      8KB

    • memory/1836-56-0x0000000001000000-0x000000000101A000-memory.dmp

      Filesize

      104KB