Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 16:44

General

  • Target

    eeff2cc1b0601b504b0edc003c6bf5b541e6ee1129e0008710ecf14a5e23ca1f.exe

  • Size

    3.7MB

  • MD5

    84b6f0407d779ad2bc76bdd9620f206a

  • SHA1

    1a5b561f2b35f73983e487c06bc5d564a6d522db

  • SHA256

    eeff2cc1b0601b504b0edc003c6bf5b541e6ee1129e0008710ecf14a5e23ca1f

  • SHA512

    ea252bf11bfdfdc9bf43c4588df1d5f2d99bf6b70e21d1a4af77f4ed2f292b8344fab78221e967cf2f4061893801e7a1c3eef3c448edc4259102666563368f36

  • SSDEEP

    49152:iDCLomiK+15C6mBPtS3FpAB+r5u8QeKxFOJxdb4vZKVx6:cootK+1k6mLYKdzOJDb4v+x

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eeff2cc1b0601b504b0edc003c6bf5b541e6ee1129e0008710ecf14a5e23ca1f.exe
    "C:\Users\Admin\AppData\Local\Temp\eeff2cc1b0601b504b0edc003c6bf5b541e6ee1129e0008710ecf14a5e23ca1f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    6KB

    MD5

    7705c02cf130e5d18b4f6aa39c0426e2

    SHA1

    74a79ce4706869a6fc1f86009585e6ea3e63b93c

    SHA256

    d791c887bcd0b79683167cdc4fbf1e207e94511150208f72de5558730848aa99

    SHA512

    5fcae39382adbb0e1e0f8f6f9ade2192b70da2c188517ac280d90d478d6e370991912187f9541ed27f4f52ee3d919c7b55183651ae62bdca2ef6553884d37b85

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    06e13daf8dcc280cba434d16f1da2362

    SHA1

    38a7f1aace6d6731dc212a59b0f121b6397c6427

    SHA256

    686412aed156655b57b9a6f0193fded13837a0248529b069a82f91eb6602740d

    SHA512

    866d9e155a3ee65075d1b1d555ea88cc65d8a4c1af299a473ec793bb9c354833855b82ae34df5def51e902df55d17dddc4597b9caa0046f2c24b252960215263

  • \Users\Admin\AppData\Local\Temp\yb74A3.tmp

    Filesize

    143.1MB

    MD5

    036b2f7390449bf5e629e6b971341322

    SHA1

    e18a2c46baafa9d42a976e4e7113bb6674cfb5d3

    SHA256

    37bd0d324c8b6d88c2ceb9d134af62d8142bab4189402767429e325801bc79dd

    SHA512

    75639c212f834d6c7a527706e9567ceea4e00dd080f21bc97cfd5e9e7ae7fff097c47f653023db50eb550779f3f8ce069fb4df7435780b58493cc75fb0fc8887

  • \Users\Admin\AppData\Local\Temp\yb74A3.tmp

    Filesize

    143.1MB

    MD5

    036b2f7390449bf5e629e6b971341322

    SHA1

    e18a2c46baafa9d42a976e4e7113bb6674cfb5d3

    SHA256

    37bd0d324c8b6d88c2ceb9d134af62d8142bab4189402767429e325801bc79dd

    SHA512

    75639c212f834d6c7a527706e9567ceea4e00dd080f21bc97cfd5e9e7ae7fff097c47f653023db50eb550779f3f8ce069fb4df7435780b58493cc75fb0fc8887