Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 18:15

General

  • Target

    76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe

  • Size

    1021KB

  • MD5

    3cc0d0740491861616c3a6a0a728e2e6

  • SHA1

    402011eadfbdc2440cfee0783d76a2499f004c83

  • SHA256

    76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273

  • SHA512

    5f6c4b4348e83e3cf55f6ed502802b6e5464fe289abb35ff27ddc2869f19b34c11619145188ae859d323e4d1143f36a54eefc79f2e7cae45179fa02888aaff85

  • SSDEEP

    24576:gvmqGi12npB+mjFXOXvAkEp3W8AD/Dhd+y4lqJ8QdCYDoDNQ:gvmbi1mpB+KtdsvD/DX+y4onCYDoDK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe
    "C:\Users\Admin\AppData\Local\Temp\76665f37f480c1124bed319c55457d7909e9179fa791bbf2971c4b3f072c0273.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Users\Admin\AppData\Local\Temp\temp1.tem
      C:\Users\Admin\AppData\Local\Temp\temp1.tem
      2⤵
      • Executes dropped EXE
      PID:952
    • C:\Users\Admin\AppData\Local\Temp\temp2.tem
      C:\Users\Admin\AppData\Local\Temp\temp2.tem
      2⤵
      • Executes dropped EXE
      PID:1920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\temp1.tem

    Filesize

    65KB

    MD5

    2aff65180ccd860c84c6de7877fa6b0f

    SHA1

    0dca808db5c8dd7a699fdd0765afbbe509817ce8

    SHA256

    6c91830c440b3ce211f6b075a2db681ca51403f53f17d74b35d5d8b9340d70e3

    SHA512

    8dcb62863954fdc45e3efc508c02b5d0ba8fdc120e5cc8a6b28a509750e406654390adc3df5b954349de6a2175783d010a2a53d532ec641217978b3331075629

  • C:\Users\Admin\AppData\Local\Temp\temp2.tem

    Filesize

    420KB

    MD5

    f121f878287d20558f185006bc121bd7

    SHA1

    1291c85d9735a6f4133277e72bfb53a68c7ce0f4

    SHA256

    b27a3c23fac022e262cec31716d744fc6dddb2224a7b6022ee4784fd55253c85

    SHA512

    a44cf979f759d57755e2b78203c0f670e7c7ee58fac2c3aea6113b4aebcd679660398f7cbb7689c6d47246752b5926925b189406550afeca11d8ca1f84cc66c9

  • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    1.1MB

    MD5

    97c8fe752e354b2945e4c593a87e4a8b

    SHA1

    03ab4c91535ecf14b13e0258f3a7be459a7957f9

    SHA256

    820d8dd49baed0da44d42555ad361d78e068115661dce72ae6578dcdab6baead

    SHA512

    af4492c08d6659d21ebfefe752b0d71210d2542c1788f1d2d9f86a85f01c3dd05eebf61c925e18b5e870aec7e9794e4a7050a04f4c58d90dca93324485690bcc

  • \Users\Admin\AppData\Local\Temp\temp1.tem

    Filesize

    65KB

    MD5

    2aff65180ccd860c84c6de7877fa6b0f

    SHA1

    0dca808db5c8dd7a699fdd0765afbbe509817ce8

    SHA256

    6c91830c440b3ce211f6b075a2db681ca51403f53f17d74b35d5d8b9340d70e3

    SHA512

    8dcb62863954fdc45e3efc508c02b5d0ba8fdc120e5cc8a6b28a509750e406654390adc3df5b954349de6a2175783d010a2a53d532ec641217978b3331075629

  • \Users\Admin\AppData\Local\Temp\temp1.tem

    Filesize

    65KB

    MD5

    2aff65180ccd860c84c6de7877fa6b0f

    SHA1

    0dca808db5c8dd7a699fdd0765afbbe509817ce8

    SHA256

    6c91830c440b3ce211f6b075a2db681ca51403f53f17d74b35d5d8b9340d70e3

    SHA512

    8dcb62863954fdc45e3efc508c02b5d0ba8fdc120e5cc8a6b28a509750e406654390adc3df5b954349de6a2175783d010a2a53d532ec641217978b3331075629

  • \Users\Admin\AppData\Local\Temp\temp2.tem

    Filesize

    420KB

    MD5

    f121f878287d20558f185006bc121bd7

    SHA1

    1291c85d9735a6f4133277e72bfb53a68c7ce0f4

    SHA256

    b27a3c23fac022e262cec31716d744fc6dddb2224a7b6022ee4784fd55253c85

    SHA512

    a44cf979f759d57755e2b78203c0f670e7c7ee58fac2c3aea6113b4aebcd679660398f7cbb7689c6d47246752b5926925b189406550afeca11d8ca1f84cc66c9

  • \Users\Admin\AppData\Local\Temp\temp2.tem

    Filesize

    420KB

    MD5

    f121f878287d20558f185006bc121bd7

    SHA1

    1291c85d9735a6f4133277e72bfb53a68c7ce0f4

    SHA256

    b27a3c23fac022e262cec31716d744fc6dddb2224a7b6022ee4784fd55253c85

    SHA512

    a44cf979f759d57755e2b78203c0f670e7c7ee58fac2c3aea6113b4aebcd679660398f7cbb7689c6d47246752b5926925b189406550afeca11d8ca1f84cc66c9

  • memory/952-60-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1168-55-0x00000000760E1000-0x00000000760E3000-memory.dmp

    Filesize

    8KB

  • memory/1168-67-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1920-66-0x0000000000400000-0x00000000005C8000-memory.dmp

    Filesize

    1.8MB

  • memory/1920-68-0x0000000000400000-0x00000000005C8000-memory.dmp

    Filesize

    1.8MB