Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    236s
  • max time network
    335s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 01:22

General

  • Target

    951f089e2a1dfc4a55540e7a9e0ac013ac5c6ec5954e33558f8e513d150c92ce.exe

  • Size

    1.2MB

  • MD5

    dc3e9ab5902b4012aa2d7c8487481c39

  • SHA1

    64d1d9545fc87f51a09c4a4f74610aae8f3d69a8

  • SHA256

    951f089e2a1dfc4a55540e7a9e0ac013ac5c6ec5954e33558f8e513d150c92ce

  • SHA512

    9e3cd677bad33db586d5f10499c16ffd3991407c74d6932c7b9c2d3f04a44ed5769c386bb29b6566138770243f8b9da49bd7876c180e5014f8577b298a74b7c7

  • SSDEEP

    24576:mpEdL1+miBQxprjUQftJLpV1VnaLcpI4Ig+JxM:EEqmvxD3pRaLcZIg+

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\951f089e2a1dfc4a55540e7a9e0ac013ac5c6ec5954e33558f8e513d150c92ce.exe
    "C:\Users\Admin\AppData\Local\Temp\951f089e2a1dfc4a55540e7a9e0ac013ac5c6ec5954e33558f8e513d150c92ce.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Users\Admin\AppData\Local\Temp\951f089e2a1dfc4a55540e7a9e0ac013ac5c6ec5954e33558f8e513d150c92ce.exe
      "C:\Users\Admin\AppData\Local\Temp\951f089e2a1dfc4a55540e7a9e0ac013ac5c6ec5954e33558f8e513d150c92ce.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/556-54-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/556-55-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/556-57-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/556-59-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/556-61-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/556-63-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/556-65-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/556-68-0x0000000076581000-0x0000000076583000-memory.dmp

    Filesize

    8KB

  • memory/556-69-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/556-70-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB

  • memory/556-72-0x0000000000400000-0x00000000004DF000-memory.dmp

    Filesize

    892KB