Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    53s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 01:11

General

  • Target

    b94f72d591ab8aab7cdc4a84ee2357b287394b54e83e7d7764b6133e987c81c4.exe

  • Size

    1.2MB

  • MD5

    0a018eb7d56bc89b79206774ea689701

  • SHA1

    e0458ed2eed36607aa4255dc173c4a9943a8b53f

  • SHA256

    b94f72d591ab8aab7cdc4a84ee2357b287394b54e83e7d7764b6133e987c81c4

  • SHA512

    e177446b61adf6706ede05abbc6c7b0ec1b40de42d8b91f1cc8424a1f83aee0ceebbfba779e9a9bdca9e085f1365fd6bb94de931fc56f5d3f2072d5b6cd0b6c3

  • SSDEEP

    24576:PpEdL1+miBQxprjUQftJLpV1VnaLcpI4Ig+JxM:xEqmvxD3pRaLcZIg+

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b94f72d591ab8aab7cdc4a84ee2357b287394b54e83e7d7764b6133e987c81c4.exe
    "C:\Users\Admin\AppData\Local\Temp\b94f72d591ab8aab7cdc4a84ee2357b287394b54e83e7d7764b6133e987c81c4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\b94f72d591ab8aab7cdc4a84ee2357b287394b54e83e7d7764b6133e987c81c4.exe
      "C:\Users\Admin\AppData\Local\Temp\b94f72d591ab8aab7cdc4a84ee2357b287394b54e83e7d7764b6133e987c81c4.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1536-54-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1536-55-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1536-57-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1536-59-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1536-61-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1536-63-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1536-65-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1536-68-0x0000000075831000-0x0000000075833000-memory.dmp

    Filesize

    8KB

  • memory/1536-69-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1536-70-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/1536-72-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB