Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2023, 00:20

General

  • Target

    58f5c3216475eb26af8c7ff3bc497fc66c395c548ba41edc0c3828e82e299cb6.exe

  • Size

    4.6MB

  • MD5

    1ff2a3b06f752dd00e80a05ed286579f

  • SHA1

    60e48e6605899a0d4986f67075df6f118748b93b

  • SHA256

    58f5c3216475eb26af8c7ff3bc497fc66c395c548ba41edc0c3828e82e299cb6

  • SHA512

    c17d45962c457df1884006367aded2a7f99959934aa865e482b695f4d25a145699df570ee077ef818c07a4dd10de151d461b65e486101ce290dd58b9c2800774

  • SSDEEP

    98304:IG1c5g+Wm3n0tzGoFrnoNspKdzOJDb4v+:UgjGoFrn4wN0v+

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58f5c3216475eb26af8c7ff3bc497fc66c395c548ba41edc0c3828e82e299cb6.exe
    "C:\Users\Admin\AppData\Local\Temp\58f5c3216475eb26af8c7ff3bc497fc66c395c548ba41edc0c3828e82e299cb6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    0c3573d5f7daacc2c1f71040aaf224cc

    SHA1

    f00c7d734e87a1880584cd2b96a55031526f7069

    SHA256

    b23f98bdcaf547980149ef2db441197bae932bfafaed943cb1de0c40316c495f

    SHA512

    568fb2f3f96bf85297d194d41ec7e25364c76c033e24a1d432e739a516d1784afb97c0cad2b0364a3c067eed5919e5a2f732d5b96bccd27e1bee1a70e96209f9

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    cf3d36515d7f67b48e272413948ab531

    SHA1

    ad371aa07bc2d95edc248f737263f7c2cb65a39c

    SHA256

    dc237b0863270f0eac0628fc8211b4de75372d723e898569bf9c1b0fea24c7f4

    SHA512

    44b21560d1e805c481b84cd94bfa4a007740e6251f984cc593aa48540f8b15a8854f7cb3de1fe82cbde72ea71bf37a9a96dc1ca7fd7e1b04d642fcc331aff2ca

  • \Users\Admin\AppData\Local\Temp\yb3A42.tmp

    Filesize

    140.4MB

    MD5

    4cb143fdad968165c2dbe48ba8950bb1

    SHA1

    cb0faa0650fba759a596663382cc6692dd8a727a

    SHA256

    4daab0bcf0af280b939c6b52df6d7b98bdad5d062b65fc4318e44f948f43103c

    SHA512

    a6613467737f9ad3a554a97e71053451eac5ba966550708b77b4b1ae1a0c1aab1845ff94563701a1ff1cad27cfef59d8f733838871d139c4599ae72a104ea821

  • \Users\Admin\AppData\Local\Temp\yb3A42.tmp

    Filesize

    140.4MB

    MD5

    4cb143fdad968165c2dbe48ba8950bb1

    SHA1

    cb0faa0650fba759a596663382cc6692dd8a727a

    SHA256

    4daab0bcf0af280b939c6b52df6d7b98bdad5d062b65fc4318e44f948f43103c

    SHA512

    a6613467737f9ad3a554a97e71053451eac5ba966550708b77b4b1ae1a0c1aab1845ff94563701a1ff1cad27cfef59d8f733838871d139c4599ae72a104ea821