Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 11:57

General

  • Target

    b3e5fc0c118efa6d3dabf34b79e237411737b4075f5a313f444d45872f1fdc50.exe

  • Size

    824KB

  • MD5

    bdfe9d99c7aab2277c0572b3dc0ef17f

  • SHA1

    3b023fbc5c3ccf305cd04819d057c5a29a979106

  • SHA256

    b3e5fc0c118efa6d3dabf34b79e237411737b4075f5a313f444d45872f1fdc50

  • SHA512

    e72e8e8882e0a87b0ed1c6608f22fd49d02801303f82086381adc046ef720e7978583e638d52d9b895ffd17651d731f87ea8967f25d8da29223ea58ae67eed90

  • SSDEEP

    12288:4iPE46C8jHgyIGTz+3pwleV8OoyxlG4QniIrcTVQLHB1iPA:4iufjAyjYpGe3oyxlG4xIrcRQjB1B

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    20jq599700.51mypc.cn
  • Port:
    21
  • Username:
    gme854ndjr
  • Password:
    Ty3Sq36Y

Signatures

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3e5fc0c118efa6d3dabf34b79e237411737b4075f5a313f444d45872f1fdc50.exe
    "C:\Users\Admin\AppData\Local\Temp\b3e5fc0c118efa6d3dabf34b79e237411737b4075f5a313f444d45872f1fdc50.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/752-54-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB