Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 16:33

General

  • Target

    easyMalicious18fdd79a71f6.exe

  • Size

    186KB

  • MD5

    1a969549c5738683fab00cbc1a322b52

  • SHA1

    a36784831fa772f728c04e8a0bc6ae7ec3ce65b6

  • SHA256

    bec836faf162007a5cc4ca6403a6ffafb20bcff890fafba153b2091a9c47cbab

  • SHA512

    a5119fa54acb0e32a2fdf5173fb345ebca8f18648830b145ae10e76c205704083f1d48caa8c1acf3bcfa2f73659ab7b34e59e1b33a2cf88af52bc887d2c50da4

  • SSDEEP

    3072:11B31bdBob2QXJe1ilDhtrRu70n1EgkSPds+UySY8kSRAqKT0pggq8YOQ/qVO+:1731bdBaBJoilF1EgkhbRAqKigP8FQ/I

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious18fdd79a71f6.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious18fdd79a71f6.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX85D6.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    847KB

    MD5

    b086a366b78ed0850bb023a93b6a6613

    SHA1

    8886c20a1c641ffbbee4b01b75dd06e4c68149c7

    SHA256

    f2088268d460db7aad8846dd506a44c3d295406f13fcfd8cce11a42788052347

    SHA512

    85e0bbf2476cbecf4142f35f91ff253eea95643274fbc440caeae1ffaec259fc4e7182b6f87b5f4e41af1c24ac1a6b67db3a2256136a862b6bbb3e4041c1fd4a

  • memory/652-161-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-162-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-157-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-158-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-159-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-160-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-80-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-87-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-163-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-164-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-165-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-166-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-167-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/652-168-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB