Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 09:11

General

  • Target

    97b9432958ea4028397360d588c30acd938e442141c149ec56910f7157662c09.exe

  • Size

    777KB

  • MD5

    c439c0305d21d27a35978b91c659a98f

  • SHA1

    3930f337165218f8420d6094d9a3c8acf6e3e3a0

  • SHA256

    97b9432958ea4028397360d588c30acd938e442141c149ec56910f7157662c09

  • SHA512

    13a4dc19ca3b9e7a0f4bdadb8248d20d5af36b439c3a98221a53fc2e365aa5b15689eae01e0324c378dbf806919a6541ca03c07fd40b1256a3375b0206aede75

  • SSDEEP

    24576:UsW/WNSZ8CLGETEjgXs4hDFqCLBkLuC4AvD:Up/HiCHbxhDMEOLutAvD

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97b9432958ea4028397360d588c30acd938e442141c149ec56910f7157662c09.exe
    "C:\Users\Admin\AppData\Local\Temp\97b9432958ea4028397360d588c30acd938e442141c149ec56910f7157662c09.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    779KB

    MD5

    61d4c65ea4d5387a2b154c5ac6ac2391

    SHA1

    0b8b2b7d387b8bcc039ee72adc0892474a07e31a

    SHA256

    95f3728d868491e0bc6d1563d148159f0980e6704b8246b397d9924d5b5469bc

    SHA512

    9c6ef62ea77736208f1138b4ba0bb2af7f416951f459578ed10b8f7ae6acd42495ff83abfaa00140ec530b0c9c07a422bf60fa9a0f52f5ea9be778424d187ba8

  • memory/1032-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1032-56-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1260-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1260-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB