Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    113s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 14:39

General

  • Target

    51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe

  • Size

    240KB

  • MD5

    505eaf14f4a7dbbcac1abd97526e9b20

  • SHA1

    8b2ea1bb7aa669cdf5d8d739ed1963bcd7f2cdbb

  • SHA256

    51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e

  • SHA512

    4c05db784c4d150b19d9955b6b24f5043038597130bdbc6e0f6547f0f6437c43503fa5bca02a2a124e7936144fb50859e9f5b894a66a63e6821719232b699f70

  • SSDEEP

    3072:O0PfBwAPkBX6EZGroxsIKZ3rYg3Q2xCGyJ9zX5gZLY:O0GAcBqEoroxsIKpphVq9zJL

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe
    "C:\Users\Admin\AppData\Local\Temp\51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe
      "C:\Users\Admin\AppData\Local\Temp\51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1072
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:524
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:524 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7BGN5URO.txt

    Filesize

    603B

    MD5

    fd66bcfbdf02ddcae4fa7f6fc0c64d40

    SHA1

    a62acb33160b734396eaeef894d650f266b28868

    SHA256

    d9c9fe9a583de61a3b25389d00be200d1bdcc666304b8d3fc3861bf8dd8a10f7

    SHA512

    8c5319364a27250e336b8a402dcf81640eef34c9a29073d73c1f41e0d39a9326a4d7f1efaf4b4ff671ab3ddc78ba8bbea04944569254922f21e2081ce9a806ab

  • memory/1692-56-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-58-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-60-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-62-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-64-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-68-0x0000000076961000-0x0000000076963000-memory.dmp

    Filesize

    8KB

  • memory/1692-69-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-70-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-73-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-55-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1768-54-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/1768-67-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB