Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 13:58

General

  • Target

    e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe

  • Size

    156KB

  • MD5

    92b253f2e92a880ba5532ad89a36b2ba

  • SHA1

    788d7749b2cbcd3e592890411bb6f3e27e75071a

  • SHA256

    e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea

  • SHA512

    e389874d740e16fbb0aeca6b1b483f72a38ee460f95d13cb0e951179c97901ddad27977321c33f61e01c3a61a8475b2a7ebc5e6faf8493d91283158a35e1ea9f

  • SSDEEP

    3072:zePoZO+WfapEDGhSdSUxxifeZuZCxQNsUq5rbMBTmnaW+vihLxhBL:zeDnDGhSdS4FJxGsp5rQl8+qhLN

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe
    "C:\Users\Admin\AppData\Local\Temp\e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1844
    • C:\Users\Admin\AppData\Local\Temp\e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe
      "C:\Users\Admin\AppData\Local\Temp\e01d8b92837ba3079923a6ae2d826b5ddf6a14639bc35bff6a05f65d50e145ea.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1124
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:628
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:628 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3GER6LA6.txt

    Filesize

    608B

    MD5

    79baa982656a6b6ab07283c4815dbf3b

    SHA1

    46c84a227d39bf8eab3ad3da47e36a687f559e01

    SHA256

    a744978626c65370a21cb002508f48244d1c266bf99ac63e0b9dfedd8b4daea2

    SHA512

    6eed051fcce0ef9cabd4f04023061702271e7148d01028566679cb252f5f3cfd27a9a45e8b970b71ffc0103f18ce7329ec8666dfc6d1ad4d503359b064155874

  • memory/1632-84-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-88-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-58-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1632-60-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1632-62-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1632-64-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1632-68-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1632-69-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1632-72-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-74-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-76-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-78-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-80-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-82-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-55-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1632-56-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1632-90-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-86-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-92-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-94-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-96-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-98-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-100-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-102-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-104-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-106-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-108-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-110-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-112-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-114-0x0000000000310000-0x000000000035E000-memory.dmp

    Filesize

    312KB

  • memory/1632-116-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1844-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

    Filesize

    8KB