Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15/08/2023, 06:15

General

  • Target

    04348f7603022e9475feeefcca7e134d1be837df54ad7d5893b6756ff7b8b244.exe

  • Size

    4.2MB

  • MD5

    4e544ed6b8f241e1f72ee058e746e152

  • SHA1

    ccc11ec15a05b675d9a490e623d362b3d716c0de

  • SHA256

    04348f7603022e9475feeefcca7e134d1be837df54ad7d5893b6756ff7b8b244

  • SHA512

    4e133577ba36f37b434332d89cd00bd4d5d233fe42e8ff46b7156fa2c88c52aa50c03d80b55158cfe4e70c80f46ba6da6b446fb157f51cdbfaa3fd1faa733f0c

  • SSDEEP

    98304:1dh5q7noS9h6mvD1PfTLWKdzOJDb4v+q7:1ZqNJPLLlwN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04348f7603022e9475feeefcca7e134d1be837df54ad7d5893b6756ff7b8b244.exe
    "C:\Users\Admin\AppData\Local\Temp\04348f7603022e9475feeefcca7e134d1be837df54ad7d5893b6756ff7b8b244.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    b1648b6c4bf7a12b7dfca2922335e1f3

    SHA1

    6b9b845e0888730c9bf19890d8852fd5a0cdc580

    SHA256

    992f7a072c7c109d2dd83763407d428a4a632eba40e603ed9237e28fdd1f20b6

    SHA512

    ab21c60407cce0305d6f0c5653d32effe730b443d68815b3ec75006b72abdce7b283370e5d45fb54793871d14edf6fe4273d7fab64d4a2c2e9a12034ebcbf912

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    d32f8f13892451c093acfdf209dc6b5f

    SHA1

    e4aead3d403ac397c6dee85c7cbefb61ad4a97d7

    SHA256

    d9793d10ffe312c7edc890c6a8cb49706baa7d68b0e4a23609706fb743ce81ed

    SHA512

    f2a4d712cfc8b51559f39cd4b83a7c077831da6ebe7260baccea6bfaafdaaa0e8b22ef6ef3784c7122e81c6fafc5bcee6b408e77bf0765472a8a4e51ff3b21c4

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    5a994dd3ffae44e3ce11fe8aff24fa4d

    SHA1

    119c0af59998da9ab7445429fd5a2626a50f5f05

    SHA256

    223d15a54b36a0507a1efe0202d84e25e2049ce4d1b6059f95f16375ed125abd

    SHA512

    c379a01570e6e01961499c63c85b7bb0ceb85d92bf340b841aa21b756214209334b8c3197cac291639cd1c8ca843511cb51ba38cbbaa29fdc00aaa47d5b4bc0e

  • \Users\Admin\AppData\Local\Temp\yb85B3.tmp

    Filesize

    129.8MB

    MD5

    51a534ddfddb68c31a1ba04aa86d5e6d

    SHA1

    25a12cdb763d5cde3d7cfc2717c84a9c9e99c130

    SHA256

    c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71

    SHA512

    1f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548

  • \Users\Admin\AppData\Local\Temp\yb85B3.tmp

    Filesize

    129.8MB

    MD5

    51a534ddfddb68c31a1ba04aa86d5e6d

    SHA1

    25a12cdb763d5cde3d7cfc2717c84a9c9e99c130

    SHA256

    c54ee5e9df39d78f2cd3fd6881e420e6d56c317b1aabf869686c6c40f9981b71

    SHA512

    1f206ad90ed780f65431068da1287dd2201fc5610bda669d3eaaecae48a85d1abd995ca32a6178c7ae1190c552c1eb328f44e0c0fe9cec4099f6f2fcf69b5548