Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 18:37

General

  • Target

    2600e4f57bf7d773132529b63a5e7177d12a556d1afb131eeeadc3e0bab3ac62.exe

  • Size

    812KB

  • MD5

    a4561a8db3594b1c058f3b19358b37f7

  • SHA1

    2dc8fab3c8dea61a1a355239321992d60fc7051a

  • SHA256

    2600e4f57bf7d773132529b63a5e7177d12a556d1afb131eeeadc3e0bab3ac62

  • SHA512

    073ab1d7276101f7df963fcf268df570ba6e7eca54ea10b9a4ebaf82f226fe4ce9a2b1cddba2ad91c5ca37b347fb5a0e79b4c67c9528454c5640ef458c8d3a27

  • SSDEEP

    24576:szYXUMumu9xWTC0ROyC30bq72yI3YBlWsFqCfH39q:Fk/HWTFOyC3MM2y6YWsFRPg

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2600e4f57bf7d773132529b63a5e7177d12a556d1afb131eeeadc3e0bab3ac62.exe
    "C:\Users\Admin\AppData\Local\Temp\2600e4f57bf7d773132529b63a5e7177d12a556d1afb131eeeadc3e0bab3ac62.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1712
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:288 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\tcz8fqz\imagestore.dat

    Filesize

    5KB

    MD5

    e43c1b7a29388da9cf8fa0e4e4947b46

    SHA1

    73d06228b4885d714a9f10462b1a9ed840584265

    SHA256

    b5ef6a85d82961a4128e20cc668a2dd86b0e920a42d75335d75ba618ccdc2a82

    SHA512

    c3996afec9f2e284ae32269234836c8dca522239d36a51153e537d36af20cda7de9822328924cddaf28d2dd5397576908d535f962cde3d6c96eabc1e4618fce9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\NBCLI897.txt

    Filesize

    608B

    MD5

    ed230e1be700320d9e54c4331c7dce12

    SHA1

    dab3cde6173dca85a90896b150f63042d50c8756

    SHA256

    19a03cc6fbe44986a2fc27b9c7819423f245fc921f4c65ac36e00528cac1b08f

    SHA512

    d5d34678be6cbde0ed7a0f3608f4c72f6b836da74852d0b9b9fff7cbb78ca31d375c3f44761e07c14998087849f3e4ae0ced1d75a448d1f10968caec7391157d

  • memory/1712-54-0x0000000075071000-0x0000000075073000-memory.dmp

    Filesize

    8KB