Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2023, 13:26

General

  • Target

    cf2dfaeb09a47c190361286349cf401008308a2fbc8316a82829e5ef46c2670a.exe

  • Size

    4.9MB

  • MD5

    bf3832d0fbf534522bfec031e6432efe

  • SHA1

    7f95c72cd721f8ee520d0dafcf893bbd4974e9bd

  • SHA256

    cf2dfaeb09a47c190361286349cf401008308a2fbc8316a82829e5ef46c2670a

  • SHA512

    bf87ca632a44018f72968e0a07ea26cdb358cd83c0d98f4616b220ada75096985602678527e59fc57d9111a701b08f9a59a074cdf4aa3f617b4a8a4b7ce28e37

  • SSDEEP

    98304:tTP0EZ36bjYOrtYtsRXIov2vRKdzOJDb4v+a:10EEYtaE8wN0v+a

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf2dfaeb09a47c190361286349cf401008308a2fbc8316a82829e5ef46c2670a.exe
    "C:\Users\Admin\AppData\Local\Temp\cf2dfaeb09a47c190361286349cf401008308a2fbc8316a82829e5ef46c2670a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab3C27.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    13ddce82bf5124ac92ea7c2129f2021f

    SHA1

    4a9d52ca7c7056a9936052c1b9b979e272c1155a

    SHA256

    c96b8e2a9777c18ae6988522f37fca2185e77cf234adb79896e37912e8f38c83

    SHA512

    90ca7fc6d3e707f1f9e880ef1d53a30268fdcce1928cbbc6d6e5dcc201ac551b459110fbaaaca6f86868399e399bdc4ccdc6af808612e1fd71bef18bccda680c

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    d54157fc0c1081b8fa85d1fec155bd35

    SHA1

    e44762cf781b32063dab2cecd7ee0ce08f94c462

    SHA256

    93b06b2dbbd7df917f5ac2d48160242145281973e0e54f414d9f50b5803ae8ef

    SHA512

    d8f0cc7435eccc49a383164553071b78840a3d6e1a0ae2608807857b20fa2ae59f18e397741c6ea9cf157cacad96bec3b125c272ea3e571e7e0a41803cca6699

  • \Users\Admin\AppData\Local\Temp\yb3784.tmp

    Filesize

    140.4MB

    MD5

    4cb143fdad968165c2dbe48ba8950bb1

    SHA1

    cb0faa0650fba759a596663382cc6692dd8a727a

    SHA256

    4daab0bcf0af280b939c6b52df6d7b98bdad5d062b65fc4318e44f948f43103c

    SHA512

    a6613467737f9ad3a554a97e71053451eac5ba966550708b77b4b1ae1a0c1aab1845ff94563701a1ff1cad27cfef59d8f733838871d139c4599ae72a104ea821

  • \Users\Admin\AppData\Local\Temp\yb3784.tmp

    Filesize

    140.4MB

    MD5

    4cb143fdad968165c2dbe48ba8950bb1

    SHA1

    cb0faa0650fba759a596663382cc6692dd8a727a

    SHA256

    4daab0bcf0af280b939c6b52df6d7b98bdad5d062b65fc4318e44f948f43103c

    SHA512

    a6613467737f9ad3a554a97e71053451eac5ba966550708b77b4b1ae1a0c1aab1845ff94563701a1ff1cad27cfef59d8f733838871d139c4599ae72a104ea821