Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 01:24

General

  • Target

    a08e6363613e43ef47b09a346777ec1952e78d497363db95f2a62d0e6d8ba1e1.exe

  • Size

    31KB

  • MD5

    b2e3d6edc48b407885eba93e6a5980e9

  • SHA1

    7dcb00176317431cb11ee6f19d44c180a03edd7e

  • SHA256

    a08e6363613e43ef47b09a346777ec1952e78d497363db95f2a62d0e6d8ba1e1

  • SHA512

    40edfa1daff0c86fb555a367651d9ecabee31f67f63c3df4fe0e997f868aa20dbb75b81a12adf25f4fbd9e4cec2fd1c40d276301831af9ca6cff16236a44c60f

  • SSDEEP

    384:7HRq3OevRQWh7WMjHVbv/9SwLVblgG9BVbf1TOpCA4V4fl6dJxb0sjonaWigemcd:b0vd9jHFv/FFlF9BFfYRoJxb0CWignq

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a08e6363613e43ef47b09a346777ec1952e78d497363db95f2a62d0e6d8ba1e1.exe
    "C:\Users\Admin\AppData\Local\Temp\a08e6363613e43ef47b09a346777ec1952e78d497363db95f2a62d0e6d8ba1e1.exe"
    1⤵
      PID:520
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
        2⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1532

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\try74lz\imagestore.dat

      Filesize

      15KB

      MD5

      f4f96eea412b978b11636c86d74869dc

      SHA1

      e15217f1d18d3db80e2f70b1b7dc44e6fd11282b

      SHA256

      f19473b021d62d2f05b4b250ff2911d24a83ee12901704ad4d143a07833c0a3e

      SHA512

      7ccbb8a11c82973f66f0d4793ffa9a17a158f17f1bc52746c15285d83dfcaa71af31222e77c4b472f5672950abf2bb30056458cadd6bde20cd631f9a7ec241d2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MYG2YA9V.txt

      Filesize

      608B

      MD5

      83f92f203e7b1560a617d831c6a0f710

      SHA1

      9f9a51520056da6867010dbe020c7bb3f7459fc9

      SHA256

      20402cc3827126b0798415910d4d0e2963cd20f6830600ecc6f2ce5169f1c8de

      SHA512

      be96488b261edfbad433c4ebe0c63ead369f5b3bf97d594cd4db0d64cbff9c2955286a03a060cb86088819722843f1309683b7a69c08bcbc9cd04c269b0e2d33

    • memory/520-54-0x0000000075351000-0x0000000075353000-memory.dmp

      Filesize

      8KB