Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075.exe
Resource
win10v2004-20230915-en
General
-
Target
c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075.exe
-
Size
4.6MB
-
MD5
2628f6107c1deb3b81ae39c04fd5e6eb
-
SHA1
bf4afa4e09ae406264a00439d4c0f91b48d0f610
-
SHA256
c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075
-
SHA512
d191df08ca302d4257763b1c834e31f21c10b55a688d2fa8e54949dd40699682b78b16537507f7e7d703a4064f2308c1184a860be6fe029ac36893d91d52edef
-
SSDEEP
98304:fcOxoa2orK2t+Gwo2xaWJWRzSKdzOJDb4v+:Tos2oWJWRzxwN0v+
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2188 c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075.exe 2188 c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2188 c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075.exe"C:\Users\Admin\AppData\Local\Temp\c0075ac5a99d358d2ad8f2ca7e4cc21bd7bd40ffce397fa028c9af4e79bf3075.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2188
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
1KB
MD5670141dcc9e364130e193377fe4a8b0b
SHA140904b70829b7e843bd885e3af8817973ea8faa7
SHA256f78d9d5e1d294975a7a10f0943857b19e9950a0dcf56480201e5dd5f1c3e5f55
SHA51275a9e358aa3d791597e19200ea2b3286bc81587386fa9b0e31f3e45903c1fd9e511ded4e2b5fbb3bb54f62ef08e85c60031004711c48956649c6a92acfdc8c6f
-
Filesize
8KB
MD50ba80d6b7e9e297a86ecb47935aff637
SHA1ef348c9bc047a6303d7cfe18c87120192c44e2fe
SHA256744f9271ab97412afc65797dcf39159079234d1372d94d31178734237bbd7059
SHA512401b1a42c72d21c014cd22fa16598ac79df04ba9c340e121de0ed61b43a66892157d53b92050c71cb5c14a5ac6ce19eea0320774ebd55137be557c7ac1598abc
-
Filesize
38B
MD527d40dfef713fed8b97c6e9004cbb307
SHA1c504e034562ee8b622174be2b6035fedf3c5f494
SHA256ecf1b5d6b6fcfb703f7a5901b9672e51b28116847b184ac30b8e269fde8d5453
SHA512c10196d55154113c1c2b51c4c53114daa5b7cc53e60c5719e5aedf8be76bb6a53a200da510658817e7f4b4d7bde52043e429df926a01f58f6641804d698e4400
-
Filesize
140.4MB
MD54cb143fdad968165c2dbe48ba8950bb1
SHA1cb0faa0650fba759a596663382cc6692dd8a727a
SHA2564daab0bcf0af280b939c6b52df6d7b98bdad5d062b65fc4318e44f948f43103c
SHA512a6613467737f9ad3a554a97e71053451eac5ba966550708b77b4b1ae1a0c1aab1845ff94563701a1ff1cad27cfef59d8f733838871d139c4599ae72a104ea821
-
Filesize
140.4MB
MD54cb143fdad968165c2dbe48ba8950bb1
SHA1cb0faa0650fba759a596663382cc6692dd8a727a
SHA2564daab0bcf0af280b939c6b52df6d7b98bdad5d062b65fc4318e44f948f43103c
SHA512a6613467737f9ad3a554a97e71053451eac5ba966550708b77b4b1ae1a0c1aab1845ff94563701a1ff1cad27cfef59d8f733838871d139c4599ae72a104ea821