Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe
Resource
win10v2004-20230915-en
General
-
Target
cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe
-
Size
14.6MB
-
MD5
6e260fd647a08f1c3cc8f8801cd092b4
-
SHA1
87d491fd373359d193b06d40a956311b39277b0a
-
SHA256
cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8
-
SHA512
82baf80687d86eba31aac36acf5fac73281b2d8830a7d318990c4cbeb4f33efd62bb90c3a7f602aa14a26f8bb09f5b9fea8d556e5514f89c370b55cb993fe16e
-
SSDEEP
393216:3VhgLN/qpGQLRetz6ruzaaNWz8Wjtq2HlOj//8XO+17nN6:3VhgR/tz6ruzaa4z8WtrHI8+w7s
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Internet Explorer\Main cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1512 cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1512 cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1512 cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe 1512 cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe 1512 cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe 1512 cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe"C:\Users\Admin\AppData\Local\Temp\cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
C:\Users\Admin\AppData\Local\Temp\cace4caef5fe43241161e865b004b14b4e3b37e8122345e38385b6519e59dce8.exepack.tmp
Filesize2KB
MD54156ed8445cb964e4d3d10234396e4d7
SHA1f8de86fc5eb1097164d8596f8d81f9f90c294097
SHA256d2ce4c3b3e18f0e4c46098495ae5d693e655c5ed7eb170b4c75b2c471331cdce
SHA512a5c2e913bda1b2aac5cd58c0b91cdc33cfd857abb7b4a636214fd325c80e46e43006ced5c18076d8ffeabd15dfc25073ab04e38cd1e074a9614b704e2142e4dc
-
Filesize
1KB
MD54fe3a339d7a8b191af53bec900ae1841
SHA1e65ceed8e70da862e4acfc4e1d5571997f0fb5d9
SHA25682a06143648465d734c6ae1752a468131d239c271ce55d43fe021fca98ab6800
SHA512dd5e1abfd1c83d735288c2062c25d189b4d334220265c2c1020e3505f45a6ff884d2f0aa2bb0f6b6feaea669f8bd54b6aa2aba57ab949f0d2e65144616b8a991
-
Filesize
1KB
MD5a971b06a6ee40fef3bb35802ab6a392b
SHA1ec53957c415c8fc644a3c8b98f4a0d9eb2010148
SHA256f5655344644b192dd6823db1482b2f31df4e3d11d815ae9b8302d6d55b6ac34d
SHA5124cd5a79681829064fdade4b6c3f77a27bf58b3fdf52575bdcec64ad892e4151de96cbbec3c2ee1de9e12b5ff35a53fead25786916be8a81c6fe2ebb15a5cc1b2