Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe
Resource
win10v2004-20230915-en
General
-
Target
e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe
-
Size
1008KB
-
MD5
9d043eedbf6f7ef3b35696bd8c2c3dae
-
SHA1
3e47f43725a54c9c25ee9418960284f150911150
-
SHA256
e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db
-
SHA512
4d13fd6e6fd711a35ed1f8ae7d1cdc6e4b7bd80d1a6b9cfb969960a56cc25d042cc50b657f506f13057d31392356d20b04a9f44427a2afe164ba3de7326bab6b
-
SSDEEP
12288:KkMUcKgXpomfqpKKIhIEij/kHzLpeVwcwfdf5aXaRCKrR/Ya2s5wjjCFL1JhRMkZ:KPUc5rfcKK4IR/s1zCatdwfUSeLEk7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main hh.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2412 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 2412 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 2392 hh.exe 2392 hh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2392 2412 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 28 PID 2412 wrote to memory of 2392 2412 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 28 PID 2412 wrote to memory of 2392 2412 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 28 PID 2412 wrote to memory of 2392 2412 e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe"C:\Users\Admin\AppData\Local\Temp\e2d112621958c459ee845d251ce454fbbc09c254903c41b2b8e46967025e62db.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Public\Documents\OK.chm2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD54c64018586b08237f90cad9836523d17
SHA1d65493d7b722ef822220f81557fc9c0a1c3b152a
SHA256cb100b082270c92d995efa3b5277341f503cb38f6c12557109614e3ff73f406e
SHA512ceab891d194a4d00dcd399182bbd1070e787a894f7ff400a7d9e7555e6868ac21cd644f37a259fda579c12d69c646862d3d2e35b19aa21a3ffee09a7f4f6f768