Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03/09/2023, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9.exe
Resource
win10v2004-20230831-en
General
-
Target
ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9.exe
-
Size
3.7MB
-
MD5
688b619aac203bb145188c421011bad5
-
SHA1
d38d639c4c11b1963c06acb81281c1651691c3a0
-
SHA256
ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9
-
SHA512
102496323e3760886052e3f9f27c35d2c65d7b2930a1cc684311261100c309c29a9a268bd49fc81f9e289aa7c60a697550ae0598b3c55f47f057de5b248cf753
-
SSDEEP
49152:WhQ8lPzRnZp4y5C6mB0j4KTB+r5u8QeKxFOJxdb4vZKV8:SllLRnZp4yE6mdVKdzOJDb4v+8
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 1700 ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9.exe 1700 ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1700 ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1700 ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9.exe"C:\Users\Admin\AppData\Local\Temp\ccc132e7ba2814b15014c92b771219ba2310aeb141c0b29bed115f3423803ae9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1700
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD58dc8f075ff691dd2dab29446e97ccc14
SHA1fca3415b7c4ca2c91d1e805422af91f37eb3866e
SHA256eee2d7b043066a147e31e921c1be650a86079440f5e4b314a82c9fd6442352e8
SHA5120e0db0bf1f288a88bad5877cdeeb173503efe2596dfd8a4edae9f7e7c5ca532bc1077f3bba74a94fe2a51d07dd666cdfaf7c9fdf8c501852351f63fb20e2f6c8
-
Filesize
38B
MD5d3c4b60beda1daaadea67cae18ac223a
SHA15b8b016fbc2251696696596c5247c54f922a1023
SHA2567b97ef09f5dc0cf5ca37863c86666c66601eba4ce0779d580c0c3d56635b7d53
SHA512e3bad418b2858d27ad5d98474bb8e50f63ee5251029c12d77ecda1d3678c42e299c5b28978d4fdb36affb7c9a866bb44bb8be8d6f9773c676a352680882c4ee2
-
Filesize
143.5MB
MD557d1ad0cd26b7e6c8b8c8207b4f5d640
SHA1f0c826dbdff06d6e14c23876f6331fea2ff8c054
SHA2568e5650e96c899074fd85714ac9acf04f517737f952aed0a1d1a3596cf4d3c4a8
SHA512e6e0f0005123e7bff7e309a5112607b501861ac94cead777f74cd8a830331f28c86200854593909958aa0a45f70304143ea555d97f5c59cfce96fe1aaa789ca9
-
Filesize
143.5MB
MD557d1ad0cd26b7e6c8b8c8207b4f5d640
SHA1f0c826dbdff06d6e14c23876f6331fea2ff8c054
SHA2568e5650e96c899074fd85714ac9acf04f517737f952aed0a1d1a3596cf4d3c4a8
SHA512e6e0f0005123e7bff7e309a5112607b501861ac94cead777f74cd8a830331f28c86200854593909958aa0a45f70304143ea555d97f5c59cfce96fe1aaa789ca9