Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 11:23

General

  • Target

    1362354891a9c0fe94738c58b147d6409a9730a866c8d2f27cb9b8da91b133c6.exe

  • Size

    10KB

  • MD5

    a35280cee24b80c77934580ca0868299

  • SHA1

    6be43443bc24aa577ab60a95a6007d9be017481b

  • SHA256

    1362354891a9c0fe94738c58b147d6409a9730a866c8d2f27cb9b8da91b133c6

  • SHA512

    391d9a83bee523439f57b1d70c3da4a3fb3559397a558928e552218f17c34115969f907bcfc7db8882c51e7f987af50c0b56c60cc4f6e16163daff584329ecbe

  • SSDEEP

    192:nbiqIXsP18touF3lcfFf5yqG/HLSX92/:biqis9Qlcffyq4ey

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\1362354891a9c0fe94738c58b147d6409a9730a866c8d2f27cb9b8da91b133c6.exe
        "C:\Users\Admin\AppData\Local\Temp\1362354891a9c0fe94738c58b147d6409a9730a866c8d2f27cb9b8da91b133c6.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Users\Admin\AppData\Local\Temp\1362354891a9c0fe94738c58b147d6409a9730a866c8d2f27cb9b8da91b133c6.exe
          "C:\Users\Admin\AppData\Local\Temp\1362354891a9c0fe94738c58b147d6409a9730a866c8d2f27cb9b8da91b133c6.exe"
          3⤵
            PID:1356

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1212-55-0x0000000002200000-0x0000000002201000-memory.dmp

        Filesize

        4KB