Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    31s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2022, 07:46

General

  • Target

    a8681001388c866694d66c910b4d39142aeb03d8eed5b152f9f7f9191f607dbd.exe

  • Size

    1.3MB

  • MD5

    300fe3d0e5d695e29bcacc04f706a9f4

  • SHA1

    1042df7729ea88453f1206add066ba68c234743e

  • SHA256

    a8681001388c866694d66c910b4d39142aeb03d8eed5b152f9f7f9191f607dbd

  • SHA512

    5a6476b02718c35ee2da49127bcc3b3316c78575d7a067563cebabeb1f8023d954e45fe168484c8071d8fefcd63e2489bcf1ab19a8cb4f628925a0c711885858

  • SSDEEP

    24576:TrKqlGCPcJKwybUDwEZZODYmR9G+gnbkk6XRJfe3DqYO/KpLwFfngWX4VmJPak6:TrKo4ZwCOnYjVmJPaB

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8681001388c866694d66c910b4d39142aeb03d8eed5b152f9f7f9191f607dbd.exe
    "C:\Users\Admin\AppData\Local\Temp\a8681001388c866694d66c910b4d39142aeb03d8eed5b152f9f7f9191f607dbd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\a8681001388c866694d66c910b4d39142aeb03d8eed5b152f9f7f9191f607dbd.exe
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1664-54-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1664-55-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1664-57-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1664-59-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1664-61-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1664-63-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1664-65-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1664-68-0x0000000074E01000-0x0000000074E03000-memory.dmp

    Filesize

    8KB

  • memory/1664-69-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1664-70-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB

  • memory/1664-72-0x0000000000400000-0x00000000004D9000-memory.dmp

    Filesize

    868KB