Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2023, 19:02

General

  • Target

    2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe

  • Size

    13.8MB

  • MD5

    0f8a23c8d5161d83797f37e682304edd

  • SHA1

    d78c78d935f28c6bc4afc6e39c44a77097160e5d

  • SHA256

    2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2

  • SHA512

    fc30e8d0a88656c5cbc96f489eb0f3863f0afdc149b41c7f7614ac3498910b975d11144f7c38428064cc42764f6e25ba8b2b7143768da9d53c2d6dfcbd4a557e

  • SSDEEP

    393216:aysSKFHl4H+5LBX+YMfSROa75dU69mPQt8vSH6Mlt:dst4H+5VNm8/U6cPQtU43t

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe
    "C:\Users\Admin\AppData\Local\Temp\2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c copy /b C:\Users\Admin\AppData\Local\Temp\쯺èÖ¾MBXr3795.exe + C:\Users\Admin\AppData\Local\Temp\ÐÞ¸ÄÓÃ.txt C:\Users\Admin\AppData\Local\Temp\쯺èÖ¾MBXr3795.exe
      2⤵
        PID:2428

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\쯺èÖ¾MBXr3795.exe

      Filesize

      13.8MB

      MD5

      0f8a23c8d5161d83797f37e682304edd

      SHA1

      d78c78d935f28c6bc4afc6e39c44a77097160e5d

      SHA256

      2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2

      SHA512

      fc30e8d0a88656c5cbc96f489eb0f3863f0afdc149b41c7f7614ac3498910b975d11144f7c38428064cc42764f6e25ba8b2b7143768da9d53c2d6dfcbd4a557e

    • memory/1652-54-0x0000000000400000-0x0000000001A5A000-memory.dmp

      Filesize

      22.4MB

    • memory/1652-55-0x0000000006D60000-0x0000000006EFF000-memory.dmp

      Filesize

      1.6MB

    • memory/1652-61-0x0000000007A20000-0x0000000007A21000-memory.dmp

      Filesize

      4KB

    • memory/1652-63-0x0000000006D60000-0x0000000006EFF000-memory.dmp

      Filesize

      1.6MB

    • memory/1652-62-0x0000000000400000-0x0000000001A5A000-memory.dmp

      Filesize

      22.4MB