Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 09:05

General

  • Target

    2cf7b3e8431e46213461774f8008eb2356702b352b25a1ae361b9294d4db0938.exe

  • Size

    104KB

  • MD5

    455708824bb896e0956858cf4f9c5120

  • SHA1

    d36f5176707db0d7289a79bbfb381b661d0735fa

  • SHA256

    2cf7b3e8431e46213461774f8008eb2356702b352b25a1ae361b9294d4db0938

  • SHA512

    f4bbe492998e89c4577d035db4b204c05dbc1c523fd9e3b1ccdcbf9234586c3e0f8c7b623b548a8884d03375df36585e88951b72ab5a7f470d519dcb9b268e97

  • SSDEEP

    1536:QXiwshheUeactU+cWMvmdPQsjVxo9lX+qhxB6UTeT1QzKwa+MKzBvcy6R:TwP1d/cW7jVmz+qx6USJQLdvc1

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cf7b3e8431e46213461774f8008eb2356702b352b25a1ae361b9294d4db0938.exe
    "C:\Users\Admin\AppData\Local\Temp\2cf7b3e8431e46213461774f8008eb2356702b352b25a1ae361b9294d4db0938.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1944
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:2040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1412-58-0x0000000076ED0000-0x0000000077079000-memory.dmp

    Filesize

    1.7MB

  • memory/1412-60-0x0000000002730000-0x0000000002737000-memory.dmp

    Filesize

    28KB

  • memory/1944-54-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB

  • memory/1944-55-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1944-56-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1944-57-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2040-59-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB