Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2023, 12:21

General

  • Target

    2c1fcc7f2d9e9fa0705060946d5c1eb924d36f4bf0387c2471a897c57cac99c8.exe

  • Size

    409KB

  • MD5

    d2573dba2ff6086dc69349aab360cd3b

  • SHA1

    9df9e33ed4c5391129f37eefde4aff9debfb5a2e

  • SHA256

    2c1fcc7f2d9e9fa0705060946d5c1eb924d36f4bf0387c2471a897c57cac99c8

  • SHA512

    4fe52542c1d523e01f78857594c95bf4cfa40f46b9ed61a462117ac778d0bd6fc4e6e3b95a344eca6624d3ee1b2fbc8c330c695f2d6c5def5f7b8bcbaad2db0b

  • SSDEEP

    12288:gWxykPY5uEafLJyea8C+CsWWzo2qxI069C3qG7jqURFd:g355a1ta8ksrqC0X3qGPFd

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c1fcc7f2d9e9fa0705060946d5c1eb924d36f4bf0387c2471a897c57cac99c8.exe
    "C:\Users\Admin\AppData\Local\Temp\2c1fcc7f2d9e9fa0705060946d5c1eb924d36f4bf0387c2471a897c57cac99c8.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NO1NR40C\ptqrlogin[1].js

    Filesize

    62B

    MD5

    35d6ed964e36afae181a94c1b38ecbd1

    SHA1

    d10bcaef1136f3934dd4162950b830d6da141ddb

    SHA256

    f098589339025fe249427c47708b19549f9f29367edae71365421f6b6ca4d90a

    SHA512

    ad92e02fafef1923d23903cb69b54504cc421f7f0a8813f61c94caf3883d8a9c92c3f1a8082d50535fa2a12290ffcdbd173bcb538b8126453e7f40b44a4f22ce

  • memory/2148-60-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-76-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-30-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-1-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-37-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-44-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-53-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-0-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-4-0x0000000000350000-0x000000000039B000-memory.dmp

    Filesize

    300KB

  • memory/2148-83-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-67-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-90-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-99-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-106-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-113-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-122-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB

  • memory/2148-129-0x0000000000400000-0x00000000005CED44-memory.dmp

    Filesize

    1.8MB