Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857.exe
Resource
win10v2004-20230915-en
General
-
Target
94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857.exe
-
Size
4.9MB
-
MD5
462636d57b6eb4f73b819e0ebaaaeed9
-
SHA1
fff6f880a9bea1f67e3a709e46d3ad63602675a0
-
SHA256
94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857
-
SHA512
6b503d49f6d76edd3db3e9d12f7c644e7bdff62daa289affaecebfb5dfa555f862f6271ffc244879d6dd94f035f477765f5bd885a0c3eec4c564cf24bad51178
-
SSDEEP
98304:JmHxs33+rz+kDBre2PUi7KdzOJDb4v+y:MxsTf2MHwN0v+y
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2948 94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857.exe 2948 94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2948 94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2948 94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857.exe"C:\Users\Admin\AppData\Local\Temp\94967a458f53e9a67f2db3e9ed78b97da400462a083481b06edcd27e05e7a857.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2948
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
1KB
MD58d04b48366eda476b1acde945834662d
SHA1ea5388f4daefc98ca3995d81c264a124651a5419
SHA2566b2a13b97fb4e71bee20116154802ca4bd8a646bc4837c8aa9827fa9a5fcd5c4
SHA512fe69d52319f0dfa4e11de10d6c67cd311818127bf31db803a5d514987a39d4a4e4586717c4b526dc1b953c31d5e8eac6e4c0cb555385c7b09590b7dfd31aab01
-
Filesize
4KB
MD561c6513d798eccc98a2fbc1d28f3d329
SHA1bc16589088b60168a2d94011eb4005509980663b
SHA25606bb57d34e97b36daed91078c9b3ecfb262469bef7397410907d1c7c3fcb42c0
SHA512b712205b0ed012b191138b469a64e3a5117504df9814175db503aa8662e1138a7ce5ec879cf5ca15a19d935c1f15604c82dd8a547723b407f3ed1241fadfacda
-
Filesize
38B
MD5f8e60c54249f75e10a3714b7be21f209
SHA144317dd66dc02813af7d6a3b3491de06b670e099
SHA25619344d6ce62aec6d0a45fceadf93a5ff3a0e5b5cee7131cb61531d8052f086d1
SHA5124b3da404b4ba2be6b7fd2cbb71171fbc341fd3be0cac415b8a7f9420c81f1f5064b0466112f192a287c74369ba48bff4033b003e1393ddca75e4fd34cd7798c3
-
Filesize
143.1MB
MD5036b2f7390449bf5e629e6b971341322
SHA1e18a2c46baafa9d42a976e4e7113bb6674cfb5d3
SHA25637bd0d324c8b6d88c2ceb9d134af62d8142bab4189402767429e325801bc79dd
SHA51275639c212f834d6c7a527706e9567ceea4e00dd080f21bc97cfd5e9e7ae7fff097c47f653023db50eb550779f3f8ce069fb4df7435780b58493cc75fb0fc8887
-
Filesize
143.1MB
MD5036b2f7390449bf5e629e6b971341322
SHA1e18a2c46baafa9d42a976e4e7113bb6674cfb5d3
SHA25637bd0d324c8b6d88c2ceb9d134af62d8142bab4189402767429e325801bc79dd
SHA51275639c212f834d6c7a527706e9567ceea4e00dd080f21bc97cfd5e9e7ae7fff097c47f653023db50eb550779f3f8ce069fb4df7435780b58493cc75fb0fc8887