Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 13:55

General

  • Target

    c18b4135de8e053069f225c7415f67a08196ebd0d06a741824b096f1032e831b.exe

  • Size

    56KB

  • MD5

    9105ab7052e98468c4c3e59ac2f663ce

  • SHA1

    a0e292477c9f9f6875bfb37ee147bf39eaf44f71

  • SHA256

    c18b4135de8e053069f225c7415f67a08196ebd0d06a741824b096f1032e831b

  • SHA512

    06260b156237e8156d536ea5bf9bdbeec1073758f71b0ac63b189841b84452aa32ebcfe47969babd9fb49f24cc471da4d85dde3370d8c9447e17b213dc7d455c

  • SSDEEP

    1536:oSmovabAYc0KTCi0RRu8qcPiENvgn/X/H5DKtIn34:jxiMYcvSRRu8viENvuHZDLI

Score
8/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c18b4135de8e053069f225c7415f67a08196ebd0d06a741824b096f1032e831b.exe
    "C:\Users\Admin\AppData\Local\Temp\c18b4135de8e053069f225c7415f67a08196ebd0d06a741824b096f1032e831b.exe"
    1⤵
    • Adds Run key to start application
    PID:560
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1504
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1816 CREDAT:996356 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Y556I59G.txt

    Filesize

    608B

    MD5

    d09bf01971419c6fe92793c740bad44e

    SHA1

    f1da3ec0c4ceee426e23e3c5b178ac06ff27e954

    SHA256

    167e9e9cf503a673599c0a4436a2e2ff28ca2f386da9539833cf4a7873c80c3b

    SHA512

    5e7fc7c18cc723c5ebc9c7ee17f6ae9a6dcb00e8fc746c4d68d7b7c53365ce414f3fc17ded32f7dcaa7bc14df4048fcfb704bc4c7ee067f1a8fbae0ce201f76d

  • memory/560-54-0x0000000076041000-0x0000000076043000-memory.dmp

    Filesize

    8KB

  • memory/560-55-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/560-56-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB