Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 00:30

General

  • Target

    9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe

  • Size

    144KB

  • MD5

    21a6758e4971d6ae338c5ef05c5fca42

  • SHA1

    a037b220d8a1de3907916eb7ac6bfa7edf40dfed

  • SHA256

    9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c

  • SHA512

    be36593e0b1669d8e71a381cc0f59bf82e2be3251118815a825fc2aafa4e36b31bd9e4e6414971f46295bb177bb68f2ef0f64eab3fec446ac3db074917968ade

  • SSDEEP

    3072:8R8CTNOgBw//psO5O1IX6gET/JTG4HZbjnCL6dgfNJZMqGmwmwmR:gNBw//psO5mIX6gETtGupn1gffZMqGma

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe
    "C:\Users\Admin\AppData\Local\Temp\9d4d85be86ebe581d58362423b8e49d9e68f464cb20b90a14595c5291abaef3c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\csest.dll",GetSystemParameter
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:1160
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275461 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\csest.dll

    Filesize

    144KB

    MD5

    af0735d19fd061f5dd3dad228cf0ad48

    SHA1

    684fe904078ad5f09b2824900bbc3d2c22f22ef7

    SHA256

    f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c

    SHA512

    d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8

  • \Users\Admin\AppData\Roaming\csest.dll

    Filesize

    144KB

    MD5

    af0735d19fd061f5dd3dad228cf0ad48

    SHA1

    684fe904078ad5f09b2824900bbc3d2c22f22ef7

    SHA256

    f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c

    SHA512

    d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8

  • \Users\Admin\AppData\Roaming\csest.dll

    Filesize

    144KB

    MD5

    af0735d19fd061f5dd3dad228cf0ad48

    SHA1

    684fe904078ad5f09b2824900bbc3d2c22f22ef7

    SHA256

    f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c

    SHA512

    d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8

  • \Users\Admin\AppData\Roaming\csest.dll

    Filesize

    144KB

    MD5

    af0735d19fd061f5dd3dad228cf0ad48

    SHA1

    684fe904078ad5f09b2824900bbc3d2c22f22ef7

    SHA256

    f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c

    SHA512

    d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8

  • \Users\Admin\AppData\Roaming\csest.dll

    Filesize

    144KB

    MD5

    af0735d19fd061f5dd3dad228cf0ad48

    SHA1

    684fe904078ad5f09b2824900bbc3d2c22f22ef7

    SHA256

    f813f21e282c146e4286646286a58e873c9b82f926c1c4868769abe9fa37927c

    SHA512

    d9d6777a4a439b7254e33a03082dd4d894df0eef012f1a646bf0a04f24bac52737c57a07604ed48d93c71bbddd012c28a63e63b883610694331a4e3fb76048d8

  • memory/1160-67-0x0000000000680000-0x00000000006A7000-memory.dmp

    Filesize

    156KB

  • memory/1160-71-0x0000000000650000-0x0000000000664000-memory.dmp

    Filesize

    80KB

  • memory/1492-54-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB

  • memory/1492-55-0x00000000002F0000-0x0000000000317000-memory.dmp

    Filesize

    156KB

  • memory/1492-59-0x00000000002D0000-0x00000000002E4000-memory.dmp

    Filesize

    80KB