Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 14:25

General

  • Target

    0426986f2a72df87b719777152e20ec78d742b4ff5d07f1c3d17e3b114480b72.exe

  • Size

    1.3MB

  • MD5

    ca72da36e0776c0b017d65e9d12a1d2a

  • SHA1

    9eade7229a0b2c58f6bfda227443f83f1203bd50

  • SHA256

    0426986f2a72df87b719777152e20ec78d742b4ff5d07f1c3d17e3b114480b72

  • SHA512

    ca500292e269975148909c6c509a481017f2b629e27f20a6925eb7f0e47e51f65f6443e72d1302208feed3dc72707e4ada31430bce30bd69bfec57f798c00bd9

  • SSDEEP

    24576:dshSQNYf0Mowstz4cq599tw85G27RpJlI5Qia:dMSlstd893nVpJzia

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0426986f2a72df87b719777152e20ec78d742b4ff5d07f1c3d17e3b114480b72.exe
    "C:\Users\Admin\AppData\Local\Temp\0426986f2a72df87b719777152e20ec78d742b4ff5d07f1c3d17e3b114480b72.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2568

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\efd.dll

    Filesize

    35KB

    MD5

    2fce4202a6fed07730175335b2bde1ea

    SHA1

    9c7e039ab121c8fe0aaa64b2a75224d41c35365a

    SHA256

    1e402b803fead55dc58fc2c08997319d2cbf9fd958e8ff388ed276e585900865

    SHA512

    e2bc52b79927cec05e0a12b89489a42726a3fc2c7f9b2f6544c28d7d8c41d6e890464b145d21dce334589b014e3a00ede823ec11b96b4406cba9d58e2c0a5150

  • \Users\Admin\AppData\Local\Temp\FiddlerCore4.dll

    Filesize

    505KB

    MD5

    79fe5228b7ccdc88cf7ddba2893ea71f

    SHA1

    4313028e5354d66be81fd2103a16b16e1ad1a6f3

    SHA256

    5850d403352d76e7f7ebda93a7bff5ab1ea57c91a54a2f6c2cfaf1c9d356d55f

    SHA512

    f46380ccd2fcb8246206f176f17c1931d57c3bc1312c95e059cf9feab4bc392ad31fa6ffc6a1dac3b0bd70c5393ab1c2cf21729e357cb7c523d487dd92aacac3

  • \Users\Admin\AppData\Local\Temp\FiddlerCore4.dll

    Filesize

    505KB

    MD5

    79fe5228b7ccdc88cf7ddba2893ea71f

    SHA1

    4313028e5354d66be81fd2103a16b16e1ad1a6f3

    SHA256

    5850d403352d76e7f7ebda93a7bff5ab1ea57c91a54a2f6c2cfaf1c9d356d55f

    SHA512

    f46380ccd2fcb8246206f176f17c1931d57c3bc1312c95e059cf9feab4bc392ad31fa6ffc6a1dac3b0bd70c5393ab1c2cf21729e357cb7c523d487dd92aacac3

  • \Users\Admin\AppData\Local\Temp\efd.dll

    Filesize

    35KB

    MD5

    2fce4202a6fed07730175335b2bde1ea

    SHA1

    9c7e039ab121c8fe0aaa64b2a75224d41c35365a

    SHA256

    1e402b803fead55dc58fc2c08997319d2cbf9fd958e8ff388ed276e585900865

    SHA512

    e2bc52b79927cec05e0a12b89489a42726a3fc2c7f9b2f6544c28d7d8c41d6e890464b145d21dce334589b014e3a00ede823ec11b96b4406cba9d58e2c0a5150

  • \Users\Admin\AppData\Local\Temp\efd.dll

    Filesize

    35KB

    MD5

    2fce4202a6fed07730175335b2bde1ea

    SHA1

    9c7e039ab121c8fe0aaa64b2a75224d41c35365a

    SHA256

    1e402b803fead55dc58fc2c08997319d2cbf9fd958e8ff388ed276e585900865

    SHA512

    e2bc52b79927cec05e0a12b89489a42726a3fc2c7f9b2f6544c28d7d8c41d6e890464b145d21dce334589b014e3a00ede823ec11b96b4406cba9d58e2c0a5150

  • \Users\Admin\AppData\Local\Temp\efd.dll

    Filesize

    35KB

    MD5

    2fce4202a6fed07730175335b2bde1ea

    SHA1

    9c7e039ab121c8fe0aaa64b2a75224d41c35365a

    SHA256

    1e402b803fead55dc58fc2c08997319d2cbf9fd958e8ff388ed276e585900865

    SHA512

    e2bc52b79927cec05e0a12b89489a42726a3fc2c7f9b2f6544c28d7d8c41d6e890464b145d21dce334589b014e3a00ede823ec11b96b4406cba9d58e2c0a5150

  • memory/2568-14-0x00000000021A0000-0x00000000021E0000-memory.dmp

    Filesize

    256KB

  • memory/2568-15-0x0000000073B80000-0x000000007426E000-memory.dmp

    Filesize

    6.9MB

  • memory/2568-19-0x00000000006E0000-0x00000000006ED000-memory.dmp

    Filesize

    52KB

  • memory/2568-20-0x00000000748B0000-0x00000000748BD000-memory.dmp

    Filesize

    52KB

  • memory/2568-24-0x0000000005330000-0x00000000053B2000-memory.dmp

    Filesize

    520KB

  • memory/2568-30-0x0000000073B80000-0x000000007426E000-memory.dmp

    Filesize

    6.9MB