Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 22:04

General

  • Target

    6d7aff1014e5b210d0901974929d5f38c9c4c9cdc32c934fe1816d8ce0864bc8.exe

  • Size

    533KB

  • MD5

    8995f07e7eca043f1fa053974cd04f3a

  • SHA1

    6bc71f02833285df4260d25e27697d921dad441f

  • SHA256

    6d7aff1014e5b210d0901974929d5f38c9c4c9cdc32c934fe1816d8ce0864bc8

  • SHA512

    d6ec3d8ed2a78c53938a8698ab60081a2281bdc078539c2bd7956619d68fdd4b3fe0e83fc267ac0d7d17e1d3c051f900e49abf91a28a71de6d621314e52c08ac

  • SSDEEP

    12288:stlYXU9NczKhfk0XSIbXUDXMCkTPWMx2GYP2Gsw:szYXU4ScYbXaMZTlxDYuw

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d7aff1014e5b210d0901974929d5f38c9c4c9cdc32c934fe1816d8ce0864bc8.exe
    "C:\Users\Admin\AppData\Local\Temp\6d7aff1014e5b210d0901974929d5f38c9c4c9cdc32c934fe1816d8ce0864bc8.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1408
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:632 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1428

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat

    Filesize

    5KB

    MD5

    af77f1846bbd42f05e743da639ff75cc

    SHA1

    aa00aaccf0ad07ece1f991509d15251f0fdfc7df

    SHA256

    16c7b76f16ce6b44ff3910644c4c1c3c9ec5567c34fcfcd803b86081b4ba0d5a

    SHA512

    1f434a1ed5a4b6743be55b7a8572a2617937717fcdc5c1fb1a248382a35b527773a5ebaf88f120fd868deaab3fb75dc6e0c32a996674b3f84e3cd8ab2cd4ea0f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LBK1QGUV.txt

    Filesize

    603B

    MD5

    06a4a69082b245b87cf3e612fa47e135

    SHA1

    9625256dbfc65aa037c8557cbb6793cb9998af8e

    SHA256

    439776b6b26290dc7075c83b6f549765d02651f35cd3de64fead652afe71261f

    SHA512

    1c5a46889f201896e3b66a45c48594678b69a3646197c90955bd9339643da5dd532995bae26e8cacdf7e517870eb9fd821398a28ed07c87d5a40527a5b314052

  • memory/1408-54-0x0000000074B51000-0x0000000074B53000-memory.dmp

    Filesize

    8KB