Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 01:28 UTC

General

  • Target

    2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe

  • Size

    160KB

  • MD5

    6e5b59ff245f9bef635cd1d8f17b3155

  • SHA1

    09547b3fb452546efca08575c252ade007937338

  • SHA256

    2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724

  • SHA512

    324a0137eaae40cd09a2ed0f70e5fc3e7c1483a50a70d571801f824bf8e106ec250b02cf24444c2f8023f64c480806ef39e57209a174ef662697684c1e1bacb4

  • SSDEEP

    3072:qm64Xco1T+HflHnMopK4meh6YVgvPq4ljI+elAxWiDUUWK:NoGqRMopKReJVgHHQlAxWTUWK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe
    "C:\Users\Admin\AppData\Local\Temp\2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Users\Admin\AppData\Local\Temp\2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe
      "C:\Users\Admin\AppData\Local\Temp\2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Deletes itself
        • Adds Run key to start application
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1072
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1744

Network

  • flag-us
    DNS
    api.bing.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    api.bing.com
    IN A
    Response
    api.bing.com
    IN CNAME
    api-bing-com.e-0001.e-msedge.net
    api-bing-com.e-0001.e-msedge.net
    IN CNAME
    e-0001.e-msedge.net
    e-0001.e-msedge.net
    IN A
    13.107.5.80
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    707 B
    7.6kB
    8
    11
  • 8.8.8.8:53
    api.bing.com
    dns
    IEXPLORE.EXE
    58 B
    134 B
    1
    1

    DNS Request

    api.bing.com

    DNS Response

    13.107.5.80

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\FTHKYF40.txt

    Filesize

    606B

    MD5

    485a6a21570ce9b6a0e5c2a712d06555

    SHA1

    2c643378081bf1289f7cbbefbcd35402b46876ca

    SHA256

    cf67e3fb8d9c00851d27eb34084a819a59c58cce0482b6ca740c9fccfee72f06

    SHA512

    14e97805b27d94d8ade674c22a736527a5260bbfee3348589b9fb2efeab9f32ebeb96460f952dffcfa3430570e7d0a7cba45abab886251764b3ece43cf27ea4a

  • memory/1116-64-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1116-67-0x0000000074C11000-0x0000000074C13000-memory.dmp

    Filesize

    8KB

  • memory/1116-58-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1116-60-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1116-62-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1116-55-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1116-72-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1116-56-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1116-68-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/1116-69-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1116-70-0x0000000000380000-0x00000000003CF000-memory.dmp

    Filesize

    316KB

  • memory/1116-73-0x0000000000380000-0x00000000003CF000-memory.dmp

    Filesize

    316KB

  • memory/1476-65-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1476-54-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.