Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2023, 19:41

General

  • Target

    bc6a7e40f08d8377866e5d8a97ac893a4a831497cfa7474a08db2f375825deca.exe

  • Size

    8.1MB

  • MD5

    118f0a3a168282d35acbd86efedfec6a

  • SHA1

    1f58fbd926f689d70fdecec54b66f0472213e5db

  • SHA256

    bc6a7e40f08d8377866e5d8a97ac893a4a831497cfa7474a08db2f375825deca

  • SHA512

    4ddd81aa0b2733228ca945338d868c6e7b6a558e8d0554ceeb06a95d1044bb3b3d1eb3e0dc510a47203b55e9d9c05e93c955de9cc56f2f8bca4bd1312cc1d03d

  • SSDEEP

    196608:wqekzNesa3YJbaogx6ZV2H747LyAIMGn:wqeMNesaIHgWVOOLyAI

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc6a7e40f08d8377866e5d8a97ac893a4a831497cfa7474a08db2f375825deca.exe
    "C:\Users\Admin\AppData\Local\Temp\bc6a7e40f08d8377866e5d8a97ac893a4a831497cfa7474a08db2f375825deca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2828

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f766a0a.tmp.mp3

    Filesize

    819KB

    MD5

    25838fb6999ea6375715024c6e696ca6

    SHA1

    00a3d64f035fb459f403c98ec4530885867ccbb3

    SHA256

    c00ca0b0ba66a6490b4046476afcaaf39112b1c14afa5e515d2a01fb7561ed46

    SHA512

    b6ef0ee690c748d1da35027d6f4e9dfca778ef6e607165f7476cbbfa2bd71aec7af10135ab7a9fc0c270295ad2864e906aa7842451f99659e77c7c1687499ff6

  • \Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32_20230427.lib

    Filesize

    1.5MB

    MD5

    4e47752eed65ff435fc524f8cefe991a

    SHA1

    2752adaeb188a975c7e73d82a4ee3eafbbafd357

    SHA256

    33ee4aca04b7c0e6d339728a2a88885b2966064522442f346b704c2b4d277e0e

    SHA512

    467a5b87706494bf9fc464d1f15d265d3188771978c11130233b375ab22ef496ca1a1f572f5f6ffe80992de8295f91659bb9f199c6b0cb8eb1b206668f979cac

  • \Users\Admin\AppData\Local\Temp\f7664eb.tmp

    Filesize

    333KB

    MD5

    56a2bcecbd3cddd6f4a35361bf4920d6

    SHA1

    992e63be423f0e61093ba183f49fc0cbec790488

    SHA256

    5fcfac18758a12e0e717a5189f379922a32b5ac12f26491e638d70b54ae1dcab

    SHA512

    473cbdf760242db1f0f1d0c27046c0564998f2bf931ad03feb28af3c7bd253d00e6f0836dadf37f29e0db4171eb64e6a15ed4cb9a9d28b48fb0aab601573f551

  • memory/2828-9-0x0000000074210000-0x0000000074301000-memory.dmp

    Filesize

    964KB

  • memory/2828-12-0x0000000061080000-0x0000000061119000-memory.dmp

    Filesize

    612KB

  • memory/2828-13-0x0000000074210000-0x0000000074301000-memory.dmp

    Filesize

    964KB