Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2022, 06:30

General

  • Target

    7c4594d34f33f5139386be168ce5269ea865ff781c857a2647070317f538ab47.exe

  • Size

    121KB

  • MD5

    3387e5bedea31eb564908498796c68f8

  • SHA1

    7d150fa2c4fbc3923246a3c899c1a15c285efcbb

  • SHA256

    7c4594d34f33f5139386be168ce5269ea865ff781c857a2647070317f538ab47

  • SHA512

    e3b1d8f125dc3e1fd359e0ef060047964f01df91f1653d4624a6169db5f1293847fc83426a6d46aa89bf49d4d41b8d434fdaec91eff74bfe15197b62affc94cc

  • SSDEEP

    3072:zEH+GiEs2SMylNOjyFbxJm5eR6TvE3Jrtto4yLFA2nF:zsehzRF0TvE3RtsSE

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c4594d34f33f5139386be168ce5269ea865ff781c857a2647070317f538ab47.exe
    "C:\Users\Admin\AppData\Local\Temp\7c4594d34f33f5139386be168ce5269ea865ff781c857a2647070317f538ab47.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K3BOSInstall.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K3BOSInstall.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K3BOSInstall.exe

    Filesize

    160KB

    MD5

    a605d2713e19069a14455b9a15562765

    SHA1

    bc3a36912889313ca4970f3bd70ecc66daf525fa

    SHA256

    d7546d78cc7e4d8f8b9fb0347fed3c67e731a811ee9932c099a96b427b5adcb1

    SHA512

    e1ea3760e456605322747dd51c5b461e148b3950be42c51e64cd59e06879cccb66495edeae31df5deb93d171cec44dbdb859711e025afb26114b6dfbc60ae2e8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K3BOSInstall.exe

    Filesize

    160KB

    MD5

    a605d2713e19069a14455b9a15562765

    SHA1

    bc3a36912889313ca4970f3bd70ecc66daf525fa

    SHA256

    d7546d78cc7e4d8f8b9fb0347fed3c67e731a811ee9932c099a96b427b5adcb1

    SHA512

    e1ea3760e456605322747dd51c5b461e148b3950be42c51e64cd59e06879cccb66495edeae31df5deb93d171cec44dbdb859711e025afb26114b6dfbc60ae2e8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\K3BOSInstall.exe

    Filesize

    160KB

    MD5

    a605d2713e19069a14455b9a15562765

    SHA1

    bc3a36912889313ca4970f3bd70ecc66daf525fa

    SHA256

    d7546d78cc7e4d8f8b9fb0347fed3c67e731a811ee9932c099a96b427b5adcb1

    SHA512

    e1ea3760e456605322747dd51c5b461e148b3950be42c51e64cd59e06879cccb66495edeae31df5deb93d171cec44dbdb859711e025afb26114b6dfbc60ae2e8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\K3BOSInstall.exe

    Filesize

    160KB

    MD5

    a605d2713e19069a14455b9a15562765

    SHA1

    bc3a36912889313ca4970f3bd70ecc66daf525fa

    SHA256

    d7546d78cc7e4d8f8b9fb0347fed3c67e731a811ee9932c099a96b427b5adcb1

    SHA512

    e1ea3760e456605322747dd51c5b461e148b3950be42c51e64cd59e06879cccb66495edeae31df5deb93d171cec44dbdb859711e025afb26114b6dfbc60ae2e8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\K3BOSInstall.exe

    Filesize

    160KB

    MD5

    a605d2713e19069a14455b9a15562765

    SHA1

    bc3a36912889313ca4970f3bd70ecc66daf525fa

    SHA256

    d7546d78cc7e4d8f8b9fb0347fed3c67e731a811ee9932c099a96b427b5adcb1

    SHA512

    e1ea3760e456605322747dd51c5b461e148b3950be42c51e64cd59e06879cccb66495edeae31df5deb93d171cec44dbdb859711e025afb26114b6dfbc60ae2e8

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\K3BOSInstall.exe

    Filesize

    160KB

    MD5

    a605d2713e19069a14455b9a15562765

    SHA1

    bc3a36912889313ca4970f3bd70ecc66daf525fa

    SHA256

    d7546d78cc7e4d8f8b9fb0347fed3c67e731a811ee9932c099a96b427b5adcb1

    SHA512

    e1ea3760e456605322747dd51c5b461e148b3950be42c51e64cd59e06879cccb66495edeae31df5deb93d171cec44dbdb859711e025afb26114b6dfbc60ae2e8

  • memory/1364-54-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB