Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2023, 13:42

General

  • Target

    b422922aecaf3119c2bc71dffcf41940c13ced20.exe

  • Size

    14KB

  • MD5

    ecbd8f41f00a45093242243777b2f4ac

  • SHA1

    b422922aecaf3119c2bc71dffcf41940c13ced20

  • SHA256

    380cfe3cfa4bce3334e3c58d146546400c23de1b3e73754eb42c58fc0b556e9c

  • SHA512

    b4a8031b6ef164a945ef0ce779af7aa189fe26b2d375984b0609fa9bf05e10f40b8debc207fba09447117edf26c2a30d6cfe7b60804fb57e47bcbc699f87c55a

  • SSDEEP

    384:vFs4l4zB8r8TuuG7gIAv83Gnb88WtpV5qFIRdV7cxVY02Ri8z:vF3QBnG7g/0mb8hsF0V7SVY0OiC

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1388
      • C:\Users\Admin\AppData\Local\Temp\b422922aecaf3119c2bc71dffcf41940c13ced20.exe
        "C:\Users\Admin\AppData\Local\Temp\b422922aecaf3119c2bc71dffcf41940c13ced20.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:752

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\SysWOW64\isndntio.dll

      Filesize

      22KB

      MD5

      6086d42386408dfffb84a97bdc3d7d1e

      SHA1

      553ad448e00d04604b2ac5e1d7733be49c217901

      SHA256

      5917ac2377625d9af6d12fd2333ac00db7298c293a89cd537c9e304bbd001115

      SHA512

      3bd63eb15b96c6a3cb5e04d15f8be85f2dcb0a447691e5c5016110e8ffbc186b76dc9fd732900a3227b5410c46a91a0968c85452c43a404f447178a862158a34

    • memory/1388-54-0x0000000002A50000-0x0000000002A51000-memory.dmp

      Filesize

      4KB

    • memory/1388-55-0x0000000002A60000-0x0000000002A61000-memory.dmp

      Filesize

      4KB