Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    62s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 10:39

General

  • Target

    doii-bmc35.exe

  • Size

    516KB

  • MD5

    6d5a0607ebac93c9d92af3f417861041

  • SHA1

    52a2332302cc7ce6828ddebb3f01e93b15a2b30d

  • SHA256

    817b05bb622cbf29ac79a63735a2b98c3eb0a0f86aa54616e26df8f654a9869b

  • SHA512

    78fa5183c7e4b75df0ef73f7ef12c8c4e30875dbbd7449cf82042cdc281023c27d741fafacf0ff6b8a0b304269af809a60b7ae6713fc58243065444f30761521

  • SSDEEP

    12288:VoCFazK3qHTEqQTgzkSJcU8C/UKEPF8JBV1Ls2LMpB8aG:LFazaqHkTEk8R8C/UKuyJBV1Ls2wBPG

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\doii-bmc35.exe
    "C:\Users\Admin\AppData\Local\Temp\doii-bmc35.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 872 -s 1812
      2⤵
      • Program crash
      PID:1020
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x190
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/872-54-0x0000000075F81000-0x0000000075F83000-memory.dmp

    Filesize

    8KB

  • memory/872-55-0x0000000074180000-0x0000000074271000-memory.dmp

    Filesize

    964KB

  • memory/872-56-0x0000000074180000-0x0000000074271000-memory.dmp

    Filesize

    964KB