Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 03:57

General

  • Target

    ec982a8ff74585c1830b24f237bcb34c63694483ebeaaea29fa3b87107db0d47.exe

  • Size

    1.4MB

  • MD5

    f4bc6f3236f05f905e211dd48080598a

  • SHA1

    970fe9d4fee5faac02c86f3a9fc4a6aa027f84c6

  • SHA256

    ec982a8ff74585c1830b24f237bcb34c63694483ebeaaea29fa3b87107db0d47

  • SHA512

    c91bfd5dbcfa703a990e5abaea6308dad6bae66939d69569b9ac4cbb38f49102eeaeb055f364ef40257020bd340cfc6eca9f87854256ee0ef1d4fcb343e70499

  • SSDEEP

    24576:ch+LIUfmQJLE0WiRiFQgUDa4rQz6Pizh1xh3SQon8aSMuR1JzS0Ih0:ch+LIUfmQVE/LmgUDXrSmuHxhCX8aSxJ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec982a8ff74585c1830b24f237bcb34c63694483ebeaaea29fa3b87107db0d47.exe
    "C:\Users\Admin\AppData\Local\Temp\ec982a8ff74585c1830b24f237bcb34c63694483ebeaaea29fa3b87107db0d47.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E_N4\WebBrowser2.fne

    Filesize

    244KB

    MD5

    58573357ee1781c12923b83750b80fb6

    SHA1

    0ed04679def908617e681dc5f1735b0d9b029089

    SHA256

    5338dfb53de32b1c9c5b1dcdbc0e8fe2431679e86248b19ce36b6fa1e56f5e6a

    SHA512

    ec7c68b52d15e75c447b14799ad4e3105644ed502d6014b414a254eb2309117527ffaf5ed030b6cb42f5e3e8acb866e16509e2bf16b463361a9e364a50d27d00

  • \Users\Admin\AppData\Local\Temp\E_N4\iext.fnr

    Filesize

    216KB

    MD5

    3f1b2b497172b65f7bb15453d0d93de0

    SHA1

    e24556e47ced0b6ae6b89a5e280b83e15ed42e8a

    SHA256

    4f9ad22aa55455f56619e76a01afeb337e1f28f61c7dde5869eb2a6d8776581e

    SHA512

    8837e6108ffde548674487c5ebba3e3dbee8bfafa5727470d3ebaeec039baefc6dc3d756a199f4fb334754985288f0a5577b32eb41fbd69295fc9681354cd3f2

  • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

    Filesize

    1.0MB

    MD5

    44e2ca67c060fbe3dc0d030149f5a478

    SHA1

    5df61eb626bc3849893701942114609c1086d496

    SHA256

    6ced19283dbbb95f264448f380592f4e98ba8228efca2f68821ab3ae61029d93

    SHA512

    1a348c7585d78dd68c1d0e059ea1d7cea57c1aeff734f834f75025719b9fdd0e9bb16aebe75e15502a1b83106387eaa9493b8990999e0a68b62c1afdbc8cf45e

  • memory/2312-0-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/2312-9-0x00000000004B0000-0x00000000004F1000-memory.dmp

    Filesize

    260KB

  • memory/2312-13-0x0000000001F40000-0x0000000001F84000-memory.dmp

    Filesize

    272KB

  • memory/2312-16-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB