Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2023, 15:48

General

  • Target

    Easy_Malicious_01f4ce8cd8dca34434d74a195816b6ad68b38d1493cc42de1fb64ce4de790256.exe

  • Size

    1.6MB

  • MD5

    bb683e92f845c1a3565b910c296e5aad

  • SHA1

    f0053be3d9771845de4ec88723e2ee64cd8ac5b5

  • SHA256

    2375917fb7f301450a7adb1a7f504d76d19628aec980a24db739ce29c83a3d68

  • SHA512

    89ab8ca01d185c62c508caee5b69281a7b150b797a540ecc9ba7f7c12e4b9cfe61178a965bf5f29619ce380ad5f0e55dff72f0f08f29e0c1e0b4251fab5f656c

  • SSDEEP

    24576:91bTJFRkPENQ8YKM9cUJfDsxbAMKGnUYMg+uEVJ/Z5exiRljdptN+rhSqWWSzZ1Z:9TFmPELDWcMDsRMYLEVP5eGFdQvu1Z

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Easy_Malicious_01f4ce8cd8dca34434d74a195816b6ad68b38d1493cc42de1fb64ce4de790256.exe
    "C:\Users\Admin\AppData\Local\Temp\Easy_Malicious_01f4ce8cd8dca34434d74a195816b6ad68b38d1493cc42de1fb64ce4de790256.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX8393.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    1.6MB

    MD5

    416db7f0cc0746e6aa83c19b45f235a3

    SHA1

    5e45ef88f5d2fda87ca6068d2779f47ee1ce2f14

    SHA256

    c25be48216d9d5064670f7b8099e20ff935ef8c4d1ae733b65cef15f00fbee9c

    SHA512

    0b407c4a28f4df15280aeafcd5202ed4637972e25fe9e536d45c6f7d59ef53bb0f33e7595c1e7268413b29931b99ae27c76c88a933216ec57b6699df2aab3bf3

  • memory/1212-167-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-168-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-163-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-164-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-165-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-166-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-161-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-162-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-169-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-170-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-171-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-172-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-173-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1212-174-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB