Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    46s
  • max time network
    89s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 17:12

General

  • Target

    37aacfb032a71a9aab5654a7eb6f2a2b98b65212d89fa2051b22f925bbf03967.exe

  • Size

    1.1MB

  • MD5

    cf170fa0387208f638b535090541c3fb

  • SHA1

    0974583b1049c1c85022467f54c6a5fd6a08750c

  • SHA256

    37aacfb032a71a9aab5654a7eb6f2a2b98b65212d89fa2051b22f925bbf03967

  • SHA512

    1357b68925a273e96d86032bc40460db87cb72522850a0ca577bd72062a5e0b26faa548e551b3d6ebed4af9e350c86b620b76cb5f604d9a86f53069b2094ff28

  • SSDEEP

    24576:Q4SJB2dX22/+TMAUp3Ch1fFYxIL6ye6gGtTEdV:Q4UB2x2/MR5CXfFYZIgGtTEdV

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37aacfb032a71a9aab5654a7eb6f2a2b98b65212d89fa2051b22f925bbf03967.exe
    "C:\Users\Admin\AppData\Local\Temp\37aacfb032a71a9aab5654a7eb6f2a2b98b65212d89fa2051b22f925bbf03967.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetWindowsHookEx
    PID:1736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-54-0x0000000000400000-0x0000000000542000-memory.dmp

    Filesize

    1.3MB

  • memory/1736-55-0x0000000000360000-0x00000000003A3000-memory.dmp

    Filesize

    268KB

  • memory/1736-58-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

    Filesize

    8KB

  • memory/1736-59-0x0000000000570000-0x000000000057B000-memory.dmp

    Filesize

    44KB

  • memory/1736-60-0x0000000000400000-0x0000000000542000-memory.dmp

    Filesize

    1.3MB

  • memory/1736-61-0x0000000000360000-0x00000000003A3000-memory.dmp

    Filesize

    268KB

  • memory/1736-62-0x00000000048F1000-0x000000000579D000-memory.dmp

    Filesize

    14.7MB

  • memory/1736-63-0x0000000000360000-0x00000000003A3000-memory.dmp

    Filesize

    268KB

  • memory/1736-64-0x0000000000400000-0x0000000000542000-memory.dmp

    Filesize

    1.3MB