Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 02:46

General

  • Target

    App/DirectoryMonitor/DirectoryMonitorConfigAssistant.exe

  • Size

    815KB

  • MD5

    67d8ba0b40cdacf007ce110e2c09801a

  • SHA1

    fd7e5d59a250956481cf005c161d8eda19084ab3

  • SHA256

    211441c9d079b604286efdf8bc81e7029a955f6e0c4d2442a7c7d1147f69e06d

  • SHA512

    58038e9951e72735ea5df50764cd4d3b4756696119622efe8ae06eef4c7ead82566b5d6db8d8c645eeeb0afd5e37ef7bb462efb0d13e317674f4191bbf002edf

  • SSDEEP

    3072:S52mS4HTwMNl8xw0SR5KIC7pLwMasRSOYJGrFrIGDb:S7S8TwMNl82VqDVLwM8ODvb

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\App\DirectoryMonitor\DirectoryMonitorConfigAssistant.exe
    "C:\Users\Admin\AppData\Local\Temp\App\DirectoryMonitor\DirectoryMonitorConfigAssistant.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\System32\Wbem\winmgmt.exe
      "winmgmt" /verifyrepository
      2⤵
        PID:2556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      35c3bc509ebec8db93f06a1b99dfda2e

      SHA1

      c9dcf480d1ce611c64e72977a0ece6c965f71122

      SHA256

      844b8bbbd361c8d77658593dc28c84beda8eef650a9ee1b4687e2ac3d0a8c4b7

      SHA512

      24e19744b22562e3f7fa409497ce16d644f623e808cfcd1ce44c7befb291e413b90c2906cb5fff51965cd343a39edbafbb4636afd07cc3c86ae66f71dc976c11

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d615c6b23b84fcdc8e37e32194339a4b

      SHA1

      4d75dd2f4404a4a37be4ec71844535db46866a21

      SHA256

      2fb0cf6c9f46e1a12042360f09f68a0b7a3b4ac25d6c5c0179155bba7485267f

      SHA512

      a4df6f31ee5642b5e23bebb879999dd439cde7d02ba4e9e59cbb5b887709f4790c017b69249ff7e9b35cde0c8091ae5fd6cbe53aa4b86d582707d28d8d7c0c2a

    • C:\Users\Admin\AppData\Local\Temp\Cab4F5A.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar4FE9.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • memory/2080-59-0x0000000000B00000-0x0000000000B80000-memory.dmp

      Filesize

      512KB

    • memory/2080-60-0x0000000000B00000-0x0000000000B80000-memory.dmp

      Filesize

      512KB

    • memory/2080-0-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

      Filesize

      9.6MB

    • memory/2080-1-0x0000000000B00000-0x0000000000B80000-memory.dmp

      Filesize

      512KB

    • memory/2080-125-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

      Filesize

      9.6MB

    • memory/2080-126-0x0000000000B00000-0x0000000000B80000-memory.dmp

      Filesize

      512KB

    • memory/2080-127-0x000007FEF5720000-0x000007FEF60BD000-memory.dmp

      Filesize

      9.6MB

    • memory/2080-128-0x0000000000B00000-0x0000000000B80000-memory.dmp

      Filesize

      512KB

    • memory/2080-129-0x0000000000B00000-0x0000000000B80000-memory.dmp

      Filesize

      512KB

    • memory/2080-130-0x0000000000B00000-0x0000000000B80000-memory.dmp

      Filesize

      512KB