Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    196s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 20:48

General

  • Target

    2790c68a9f9158ada1db2a2640c195e0b7a4df31a0f3cced8f7420bbc0ba2c74.exe

  • Size

    74KB

  • MD5

    4771cffe19e2018f976be1065d387922

  • SHA1

    81dfb0ca6db479819dbf4bd09245489adc51053d

  • SHA256

    2790c68a9f9158ada1db2a2640c195e0b7a4df31a0f3cced8f7420bbc0ba2c74

  • SHA512

    78250c723a4df089b2d9789aa33c38d6d59f483ad84cfd46633878f337d2bc479eea0e4096a1c0fd5f4474e5dba9a2eb2f9d1ebf5b92d22501f668bfe08b57fd

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOSa:RshfSWHHNvoLqNwDDGw02eQmh0HjWOSa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2790c68a9f9158ada1db2a2640c195e0b7a4df31a0f3cced8f7420bbc0ba2c74.exe
    "C:\Users\Admin\AppData\Local\Temp\2790c68a9f9158ada1db2a2640c195e0b7a4df31a0f3cced8f7420bbc0ba2c74.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    74KB

    MD5

    91ae4ec3059f806cf2c8916c0691511c

    SHA1

    e5711bbd5c61d698d6f70c20311e55d212cff276

    SHA256

    1033e6c6b8be1511b84c4243065ea74d90912a6a5cd62a83a18904d8ec40009d

    SHA512

    c3d66a2dd19c95b3543b99be9eec88c0b534d8702e8cc6eb52c11ae229a2825198ad2457c31be88974f723d5377c093035a6f92e7e8ed8b3cd7cda61d38c9885

  • C:\Windows\system\rundll32.exe

    Filesize

    81KB

    MD5

    42100762227b1180e2b45796ebb4728a

    SHA1

    7a0af6ae3bbaa3aa94cf03d60849c6ddee7472e1

    SHA256

    35eeea253d0632349941e0ea98a0df28a8eafe89266920b399b553a3fa2a0f5f

    SHA512

    83b5882bacabbdecec550a23970800b27f6b259dfa07a84e6793707acfcacb1a1b6c98e6704acea73b8d548c6b4a880d989f7a57530b5a6a4026b781cb070dd1

  • C:\Windows\system\rundll32.exe

    Filesize

    81KB

    MD5

    42100762227b1180e2b45796ebb4728a

    SHA1

    7a0af6ae3bbaa3aa94cf03d60849c6ddee7472e1

    SHA256

    35eeea253d0632349941e0ea98a0df28a8eafe89266920b399b553a3fa2a0f5f

    SHA512

    83b5882bacabbdecec550a23970800b27f6b259dfa07a84e6793707acfcacb1a1b6c98e6704acea73b8d548c6b4a880d989f7a57530b5a6a4026b781cb070dd1

  • \Windows\system\rundll32.exe

    Filesize

    81KB

    MD5

    42100762227b1180e2b45796ebb4728a

    SHA1

    7a0af6ae3bbaa3aa94cf03d60849c6ddee7472e1

    SHA256

    35eeea253d0632349941e0ea98a0df28a8eafe89266920b399b553a3fa2a0f5f

    SHA512

    83b5882bacabbdecec550a23970800b27f6b259dfa07a84e6793707acfcacb1a1b6c98e6704acea73b8d548c6b4a880d989f7a57530b5a6a4026b781cb070dd1

  • \Windows\system\rundll32.exe

    Filesize

    81KB

    MD5

    42100762227b1180e2b45796ebb4728a

    SHA1

    7a0af6ae3bbaa3aa94cf03d60849c6ddee7472e1

    SHA256

    35eeea253d0632349941e0ea98a0df28a8eafe89266920b399b553a3fa2a0f5f

    SHA512

    83b5882bacabbdecec550a23970800b27f6b259dfa07a84e6793707acfcacb1a1b6c98e6704acea73b8d548c6b4a880d989f7a57530b5a6a4026b781cb070dd1

  • memory/2204-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2204-12-0x0000000000350000-0x0000000000366000-memory.dmp

    Filesize

    88KB

  • memory/2204-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2204-20-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2632-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB