Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    28s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 10:28

General

  • Target

    b6c9502bd7aaf0277098a8796ad53a055a633961eb775ced1e21401f444688a8.exe

  • Size

    59KB

  • MD5

    2c06d52f9352752e3086d8266e5c58d4

  • SHA1

    e7f3ea5dc2cd7da75f93716e8278b9ec99abe539

  • SHA256

    b6c9502bd7aaf0277098a8796ad53a055a633961eb775ced1e21401f444688a8

  • SHA512

    6d2143f2f7001184e6955c27bef58cae85741adfc194ec0ba28dce25bf2560160985a881209fb41eb16839f563268ca664dbe11bd75adf72093e39a55a7576b5

  • SSDEEP

    768:VQgS+b3qXaAC1L1KlWrpn5NyUQJrs+9EuBbtmBnn/LcisKl4qR:bbaKACfKupn5NnQ7zlt8nn/YisKldR

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\b6c9502bd7aaf0277098a8796ad53a055a633961eb775ced1e21401f444688a8.exe
        "C:\Users\Admin\AppData\Local\Temp\b6c9502bd7aaf0277098a8796ad53a055a633961eb775ced1e21401f444688a8.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Users\Admin\AppData\Local\Temp\b6c9502bd7aaf0277098a8796ad53a055a633961eb775ced1e21401f444688a8.exe
          "C:\Users\Admin\AppData\Local\Temp\b6c9502bd7aaf0277098a8796ad53a055a633961eb775ced1e21401f444688a8.exe"
          3⤵
            PID:1372

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/864-58-0x0000000000400000-0x0000000000410000-memory.dmp

        Filesize

        64KB

      • memory/864-59-0x0000000000240000-0x0000000000250000-memory.dmp

        Filesize

        64KB

      • memory/1212-56-0x00000000021C0000-0x00000000021C1000-memory.dmp

        Filesize

        4KB

      • memory/1372-55-0x0000000000400000-0x0000000000410000-memory.dmp

        Filesize

        64KB