Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 06:03

General

  • Target

    abd557610911d43fde341e632037be3d8a354aa7cf22c9be73c1d0ec085eb080.exe

  • Size

    875KB

  • MD5

    696e382670f08dfa31aad9e1edd9fe57

  • SHA1

    2cec85c75c5469fe4c534d0d2f373b23c8c55929

  • SHA256

    abd557610911d43fde341e632037be3d8a354aa7cf22c9be73c1d0ec085eb080

  • SHA512

    a0ee739b093c69ad9f161d56b975930d719327e847a79b3a49a612eb8c0bd1eacc1b48dc6aa88b431aff0dc4452e169b388e3915ece57f76503b713709cc66ca

  • SSDEEP

    12288:NFFXXz3WXIg9zTtyBc6NdRyqla3QYnoirhPoarIFYwPMI/2rJG/DQcDIqyXYQH:NHrW59NyBc6LYoed0PeYc0IqUYQH

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abd557610911d43fde341e632037be3d8a354aa7cf22c9be73c1d0ec085eb080.exe
    "C:\Users\Admin\AppData\Local\Temp\abd557610911d43fde341e632037be3d8a354aa7cf22c9be73c1d0ec085eb080.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2012-54-0x0000000075E81000-0x0000000075E83000-memory.dmp

    Filesize

    8KB

  • memory/2012-55-0x0000000001F80000-0x00000000020C5000-memory.dmp

    Filesize

    1.3MB

  • memory/2012-63-0x0000000001F80000-0x00000000020C5000-memory.dmp

    Filesize

    1.3MB

  • memory/2012-62-0x0000000001F80000-0x00000000020C5000-memory.dmp

    Filesize

    1.3MB

  • memory/2012-64-0x0000000001F80000-0x00000000020C5000-memory.dmp

    Filesize

    1.3MB