Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 07:19

General

  • Target

    63e781dac5d66b02b9d7d4c01c57e3adaf5ab53339290433a1f3cf90f33a5fea.exe

  • Size

    26KB

  • MD5

    70c714ef7f5dbff570b507135daa4a3a

  • SHA1

    ed47c25b6c92b6fc8ff3f638f8e4ae325e4a5cde

  • SHA256

    63e781dac5d66b02b9d7d4c01c57e3adaf5ab53339290433a1f3cf90f33a5fea

  • SHA512

    39cd4e9dadb136f380157e5b7275fc940ef2bda500adc9807956d071373b53bb35d476445fb38b0ca25895052d0a4d101a67a3132ac99073fb46ec35f54e622e

  • SSDEEP

    384:fvLvapEEieU/bN4zq9QTtTgzMSVaIdrzaUH0JYoAF7n+2wJTyEwHRvJfXBJD/UN:HyEEJcBJ9EtSMSV1QUUGpEwZ1xJDcN

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63e781dac5d66b02b9d7d4c01c57e3adaf5ab53339290433a1f3cf90f33a5fea.exe
    "C:\Users\Admin\AppData\Local\Temp\63e781dac5d66b02b9d7d4c01c57e3adaf5ab53339290433a1f3cf90f33a5fea.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    PID:1412
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1412-54-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1412-55-0x0000000075771000-0x0000000075773000-memory.dmp

    Filesize

    8KB

  • memory/1412-56-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1412-57-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB