Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    34s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 09:57

General

  • Target

    cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe

  • Size

    121KB

  • MD5

    8b5ce176105c5e9189a080dae6ef906e

  • SHA1

    211c58f6dbf0d5d14e9f560353d4b3ef03f0b705

  • SHA256

    cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196

  • SHA512

    2e428f5b96c1f27bfb3c908e3f6498708174efe54a2fb3603fb298e706c0d2ab1f1e6c0a9c6355290b211898f23f0fdd9eae9090f4aa11687081fc79f8c1d5b7

  • SSDEEP

    3072:xnj9jtfU+INndIc0J25lzn90Z3cWCWCV6PZR7olFV4mV7lMdGQY:xjbeiA9rWfCV6PZqFV4u7Kds

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe
        "C:\Users\Admin\AppData\Local\Temp\cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1764
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1568
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1552
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2024

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe

      Filesize

      124KB

      MD5

      fe6b0190806dbe8fbbcf5134f21fb7d6

      SHA1

      9b0b25c4a0a4b4a25ececaa42324ec1257b19ca7

      SHA256

      0c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5

      SHA512

      1851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f

    • memory/1256-96-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1568-68-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1568-69-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1568-65-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1568-66-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1568-94-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1568-102-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/1568-103-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1952-54-0x00000000758C1000-0x00000000758C3000-memory.dmp

      Filesize

      8KB

    • memory/2024-95-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2024-104-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB