Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 10:57 UTC

General

  • Target

    edd7837a1f29ca659aa646c9677e250eb588a4753d8f29d98fe0a19c00727ed1.exe

  • Size

    1.4MB

  • MD5

    fe61b30a71369fae49939b595631ff47

  • SHA1

    c6c23ffafa68c73e28dc3cde9f7033f15095489b

  • SHA256

    edd7837a1f29ca659aa646c9677e250eb588a4753d8f29d98fe0a19c00727ed1

  • SHA512

    1c1995b6b36562cc1d1513d8b4cd791ce9a19803633a210171770dbd2056726d7628fdf79cc314f9abfeb9d101875c5ed28ee6144d3f2da8d6863e558928843c

  • SSDEEP

    24576:Hq+0QyI6VmrEGNLVV4mpeCNRcg7KD5120nfhiadM2Ob0JC9c+e4JsVBw2qbyuzN:jryI8GNxL1J7i20nfhiJ2Ool+e9ViFdN

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edd7837a1f29ca659aa646c9677e250eb588a4753d8f29d98fe0a19c00727ed1.exe
    "C:\Users\Admin\AppData\Local\Temp\edd7837a1f29ca659aa646c9677e250eb588a4753d8f29d98fe0a19c00727ed1.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.a585.com/?down
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:828

Network

  • flag-unknown
    DNS
    www.a585.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.a585.com
    IN A
    Response
    www.a585.com
    IN CNAME
    hg033tiaozhuan.as40065cnservers.com
    hg033tiaozhuan.as40065cnservers.com
    IN CNAME
    hg033com.as40065cnservers.com
    hg033com.as40065cnservers.com
    IN CNAME
    y4p37mbk-u.as40065cnservers.com
    y4p37mbk-u.as40065cnservers.com
    IN CNAME
    6az7fc4s.n.as40065cnservers.com
    6az7fc4s.n.as40065cnservers.com
    IN A
    103.117.100.129
  • 103.117.100.129:80
    www.a585.com
    IEXPLORE.EXE
    152 B
    3
  • 103.117.100.129:80
    www.a585.com
    IEXPLORE.EXE
    152 B
    3
  • 103.117.100.129:80
    www.a585.com
    IEXPLORE.EXE
    152 B
    3
  • 103.117.100.129:80
    www.a585.com
    IEXPLORE.EXE
    152 B
    3
  • 204.79.197.200:443
    ieonline.microsoft.com
    IEXPLORE.EXE
    152 B
    3
  • 8.8.8.8:53
    www.a585.com
    dns
    IEXPLORE.EXE
    58 B
    193 B
    1
    1

    DNS Request

    www.a585.com

    DNS Response

    103.117.100.129

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\DHBDWPTK.txt

    Filesize

    605B

    MD5

    a86e38b509dfdd70545fa8c1d4419911

    SHA1

    3904665d7de175c2a8d6acd3bb2ff9b548aae73d

    SHA256

    ea59346f144768fc1e7c2524315d14a6f943b900a1c94bbd603fd0b0a01f868e

    SHA512

    7425db7a5990828aebdb286ebc95fca1c6b68f59d1f737c3f337993c0011db39a54aafe659aa9eb870b95ad7dc886de1eaeb506aecf64b37a03f9c48f76a0c71

  • memory/1612-55-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/1612-57-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.