Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    67s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 10:00 UTC

General

  • Target

    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe

  • Size

    890KB

  • MD5

    cd1ac199fcb1ca277e9c2f66e01722ef

  • SHA1

    9f2c2fc79c4f07357e9215c2da8dc8b03949cb67

  • SHA256

    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53

  • SHA512

    266431d4cd3811777ef1f46b09c420959d8e067581c5ff83e017e7a3f027035c3f0fb36bdab5e48baee3e2339917321b77b674a8b7ee1d57c5d05deb82feb2fb

  • SSDEEP

    12288:DX+06tuHw2/n4xwaVRCYhFIiNJc+EhgWJTgFOvqm7lQ3/JeS2qjpqo5ywNXuZvFy:r632/OhOWmWYCMCkZoq9uXGQczy6mTWg

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe
    "C:\Users\Admin\AppData\Local\Temp\3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1444

Network

  • flag-unknown
    DNS
    c1.allocal.info
    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe
    Remote address:
    8.8.8.8:53
    Request
    c1.allocal.info
    IN A
    Response
  • flag-unknown
    DNS
    r1.joburnt.net
    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe
    Remote address:
    8.8.8.8:53
    Request
    r1.joburnt.net
    IN A
    Response
  • flag-unknown
    DNS
    c2.allocal.info
    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe
    Remote address:
    8.8.8.8:53
    Request
    c2.allocal.info
    IN A
    Response
  • flag-unknown
    DNS
    r2.joburnt.net
    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe
    Remote address:
    8.8.8.8:53
    Request
    r2.joburnt.net
    IN A
    Response
No results found
  • 8.8.8.8:53
    c1.allocal.info
    dns
    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe
    61 B
    140 B
    1
    1

    DNS Request

    c1.allocal.info

  • 8.8.8.8:53
    r1.joburnt.net
    dns
    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe
    60 B
    133 B
    1
    1

    DNS Request

    r1.joburnt.net

  • 8.8.8.8:53
    c2.allocal.info
    dns
    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe
    61 B
    140 B
    1
    1

    DNS Request

    c2.allocal.info

  • 8.8.8.8:53
    r2.joburnt.net
    dns
    3bd71162047fe46453f28c709cf909a4d034c5752b6fd8d4a607ecef9051ef53.exe
    60 B
    133 B
    1
    1

    DNS Request

    r2.joburnt.net

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1444-54-0x0000000075D71000-0x0000000075D73000-memory.dmp

    Filesize

    8KB

  • memory/1444-55-0x0000000000C90000-0x0000000000E15000-memory.dmp

    Filesize

    1.5MB

  • memory/1444-62-0x0000000000C90000-0x0000000000E15000-memory.dmp

    Filesize

    1.5MB

  • memory/1444-63-0x0000000000C90000-0x0000000000E15000-memory.dmp

    Filesize

    1.5MB

  • memory/1444-64-0x0000000000C90000-0x0000000000E15000-memory.dmp

    Filesize

    1.5MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.