Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 15:19

General

  • Target

    easy_Malicious_1444ca88dcb00e3736815e06454a2468b035556ba359ac917980a13530a8f792.exe

  • Size

    293KB

  • MD5

    6b829656d61a753eaf0245365227af50

  • SHA1

    b1fd0f223b092f89b0e83035317d865d42bd31c2

  • SHA256

    cbeb459e3bf48d1e3e940cade5da3c4b25b736d438537b70be01694557dfeb73

  • SHA512

    99143497d50c20c28047d00a834b86c226ccd5db3e0684e2fd6a87fd84f3225bb524f6727e055ce22ec7c69216f3be11625f0e91d13d9f18931f453449cc0117

  • SSDEEP

    6144:s731bdBaBIMMTQxbDAmGtcWztwjJsrIJ0p92NWukgkivel/KHRmZDT7W7:u1bqDAlq9lgsstgkiWpKKXe

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_1444ca88dcb00e3736815e06454a2468b035556ba359ac917980a13530a8f792.exe
    "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_1444ca88dcb00e3736815e06454a2468b035556ba359ac917980a13530a8f792.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXA44E.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    847KB

    MD5

    412d17ea01900266dc286c256be305c7

    SHA1

    67b6d60dfac21e3cc22cb7c6cbfea6f4101f7e29

    SHA256

    cd8198f60b093dbaa84600465ac11a5c124e564c8da48a7d6003e45833600487

    SHA512

    55553b09de95ed1223878f09a1ca4f772d8ffbd3670b26dd8724362182c7c8cf64ed174cacf8e8de3be0f3c24f14690335f0e67a86e4c05c88aae5030168ed04

  • memory/2380-163-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-164-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-89-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-160-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-161-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-162-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-79-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-91-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-165-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-166-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-167-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-168-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-169-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2380-170-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB