Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 15:44

General

  • Target

    a6cf37a44fcdb30220b0d1c249cec909f1fcddf15956c6cc1448f456fb13d243.exe

  • Size

    20KB

  • MD5

    8236b1cc20fde4c5065381272f29c180

  • SHA1

    b0c9e25cfd09830d7aba279885f63b9ae6b0f97a

  • SHA256

    a6cf37a44fcdb30220b0d1c249cec909f1fcddf15956c6cc1448f456fb13d243

  • SHA512

    52c4e8840944941d3d72b42d729d7a8aaac8a9372c48162f994ab5c70775024f689299938d320576f849e13c17c9762cfa3d670130a92bdcfdf6dabe7529246b

  • SSDEEP

    384:rUeMBcTAcl810UugcosSe6XiUdNLLLLLLLLLLL9gbcRv1qAnYSQ:rFMCTAc+qlF7QiUdNLLLLLLLLLLL0AYv

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6cf37a44fcdb30220b0d1c249cec909f1fcddf15956c6cc1448f456fb13d243.exe
    "C:\Users\Admin\AppData\Local\Temp\a6cf37a44fcdb30220b0d1c249cec909f1fcddf15956c6cc1448f456fb13d243.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.redirectingtocontent.com/go.php?siteid=37&country=USA
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\695EQN8P.txt

    Filesize

    608B

    MD5

    d6843e8b1c108df80f6bd843f9ac96b0

    SHA1

    9b8f95d8bf2fa36c01e664824d68ad71329f691f

    SHA256

    f9930a655851d568f268735a791fd6de119020d2b6b0ce9f603ea2865d0a71de

    SHA512

    1630823d00f3b39dfee44b16ddbc7b600e6023caae7e32303e23f57ba65ab82be593ab3b6249b4014a841cb0cdbc07c560dff0b88c11da1ec0bd861391238f7c

  • memory/748-54-0x0000000075B11000-0x0000000075B13000-memory.dmp

    Filesize

    8KB

  • memory/748-55-0x0000000000400000-0x00000000007E0000-memory.dmp

    Filesize

    3.9MB

  • memory/748-56-0x0000000000400000-0x00000000007E0000-memory.dmp

    Filesize

    3.9MB