Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 15:27

General

  • Target

    easy_Malicious_19e53fa3e6e4ce1c3686190ad6a8c561176e39580463cd749cb361e711e4947e.exe

  • Size

    76KB

  • MD5

    7796364b66fb1f95f63d16b9d809cff4

  • SHA1

    ab6e13a5d248d7d82f36b283a0724d886a21590a

  • SHA256

    5109e264b66b0146e69562bb5aed5d76b5e55dbf2a576cd7d21d46b489c190d3

  • SHA512

    a1124b9891506f07e98388efb7c7712e992efc1126c152b09f406fa4a0bbef2f4b3b144d23340eae96d4098617b4cec9e665e097efb839a440362cfa19669d93

  • SSDEEP

    1536:kaiqH1s+kCtrA2UMT0mTFibDKa1XFabc/HKoQgnO:t1B31bdBob2QXkGqoU

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_19e53fa3e6e4ce1c3686190ad6a8c561176e39580463cd749cb361e711e4947e.exe
    "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_19e53fa3e6e4ce1c3686190ad6a8c561176e39580463cd749cb361e711e4947e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2184

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX4EA0.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    847KB

    MD5

    43d4f0e2dc7f171fa9056f574e646f74

    SHA1

    2947b7c350cdb18c0844ce740fb149081a22b1be

    SHA256

    0342381b1f81659b917e7bad929bfcd03685e00e0c663729c69a823fba728367

    SHA512

    29b81a50a58c1782ffaa8962f5955e89b2803ad5d8990d15581dcbf3a9489b1fff9c77c69b4762889d4db8fdd8c761eab37f2a570e7a2a6f5fe23ae3b6f1be2e

  • memory/2184-154-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-155-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-150-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-151-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-152-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-153-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-89-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-149-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-156-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-157-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-158-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-159-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-160-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2184-161-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB