Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 08:17

General

  • Target

    6890f53dba9a378fe537683528c4a5dd7ceff0a1bafcec9f906b7b9727b76c2b.exe

  • Size

    104KB

  • MD5

    be58b3dcfce681a3f975bf35e3fe59a2

  • SHA1

    8fef86c83f0acf68299df5ab5db12c88db121494

  • SHA256

    6890f53dba9a378fe537683528c4a5dd7ceff0a1bafcec9f906b7b9727b76c2b

  • SHA512

    9027d5f05fc5130b0a2d2c2b741fb1fe262bca040fb65b054e8de5462c80780de20b386a593e8cf4949d173d56ab77b9c847377cddaa33a123de6d3a0691adab

  • SSDEEP

    1536:3O3r0j/g542+TYK3AoPyxmVoXTKJej1eItbTo/fmnO1454k4sfst:3O3r0rjB5PyxmVobjhJWhsfG

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6890f53dba9a378fe537683528c4a5dd7ceff0a1bafcec9f906b7b9727b76c2b.exe
    "C:\Users\Admin\AppData\Local\Temp\6890f53dba9a378fe537683528c4a5dd7ceff0a1bafcec9f906b7b9727b76c2b.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1992
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1248-58-0x0000000076F30000-0x00000000770D9000-memory.dmp

    Filesize

    1.7MB

  • memory/1248-59-0x0000000002990000-0x0000000002998000-memory.dmp

    Filesize

    32KB

  • memory/1992-54-0x00000000760C1000-0x00000000760C3000-memory.dmp

    Filesize

    8KB

  • memory/1992-55-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1992-56-0x00000000001C0000-0x00000000001D9000-memory.dmp

    Filesize

    100KB

  • memory/1992-57-0x00000000001C0000-0x00000000001D9000-memory.dmp

    Filesize

    100KB