Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    195s
  • max time network
    237s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 14:57

General

  • Target

    2379dd4a25c0700fda573a9cbd1e9a0b496f06f1da11b2e62579e1dc47b67337.exe

  • Size

    4.0MB

  • MD5

    ceb9ac99ed1531aeae28fb4b01313730

  • SHA1

    0eb41aea1e40c0c17e361be2df17bf53ce6c482d

  • SHA256

    2379dd4a25c0700fda573a9cbd1e9a0b496f06f1da11b2e62579e1dc47b67337

  • SHA512

    cb6bcca131e3248d77426ec6414c63382c7533589a273ca57f017dc4762d413a9ae160dedd1c20d23b62222a81968581ba694bad7558a6ac896c6fa29dc78b93

  • SSDEEP

    49152:eub3nCuhEBygPHQK2FWu5wQY+r5u8QeKxFOJxdb4vZKVZ:Nb3CuhEcgYK2FHKdzOJDb4v+Z

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2379dd4a25c0700fda573a9cbd1e9a0b496f06f1da11b2e62579e1dc47b67337.exe
    "C:\Users\Admin\AppData\Local\Temp\2379dd4a25c0700fda573a9cbd1e9a0b496f06f1da11b2e62579e1dc47b67337.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:3052

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    ae53f91a04f0e7ef1d98ed626ce9adf5

    SHA1

    98b0e097b31766a65292afccca03bcc51b120e59

    SHA256

    d8ec406524e914c021c691d44fad3f3b96180fe7ad0f2d29fe8ad15e49c6db74

    SHA512

    a6b603ee8842295c22b08f58390b381d0f2d662c7b55394e91f87c0e3365153509aacd703785845daf3fcd2932fe11ef6d198a1656df11d175613d1d2b5401fb

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    4c564eb8a81e8542cca3f80cf53a5d9f

    SHA1

    438a68c04d4ae8c291ddbfd1846bf2d78262775a

    SHA256

    96a58e9415202af0a230c332c77224692e429f20b276e96fc488aa09f2c84145

    SHA512

    1e1a442d86f148405db3d25d2a102be9b53acbab8ef8d82424bdaed587c940a475c3fb98c6d1659dfdaa50911cd6ef52b48677b6d9f38a98378fab37af085cbb

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    3b69c4947916aaa914fc2eab76393162

    SHA1

    9e62c0d04977ce8ba21956f265776edc8a4f7a4b

    SHA256

    943e86b60cec4df248d397a73e4388d66fbaa40b73f86810ec57852eeb89372f

    SHA512

    b51caece06560708bc175cb6e67ae7e285827e1baabdb1e61e2f3bb1386b95236cdd1eeb7b644306689afb62e1e0c90fe8685e1e02b0a455d30a938bc09eb89e

  • \Users\Admin\AppData\Local\Temp\ybE7EF.tmp

    Filesize

    70.4MB

    MD5

    b8e7f43bba58143893622a6861107bdd

    SHA1

    7ef647d25516a517c251fcb7bcf9aa99e29b4e97

    SHA256

    9d1b7f3820dc638488ce1d8452345c0af2f4c694f098b2bfdcdac47371293ece

    SHA512

    2ac84d6e28f2d1437beb99009b776ab45fff18edd38cbd6420b9fe4dba299760d6274be00f04b3bf80aa31253e380f19b76be59b2495a3aff870dd7d3fcb90c9

  • \Users\Admin\AppData\Local\Temp\ybE7EF.tmp

    Filesize

    71.1MB

    MD5

    64fa68bfac3bb89c93ac2f8ee1be3d1b

    SHA1

    bbd4ed00d25ef54df3dfa8c45687bae47d4990d0

    SHA256

    907091e67c3a067a551bb010c2bd6724a9ebf1514381da4934ea511cd45bd488

    SHA512

    5ae12547f50ef5964e021766f4f554f0514b79d71cea3019f74ca132b33b6579e2c95b1f8dfad4cc4a7c40cbdfe4e5f440ecb8bcf694f6b431c2bf3d3cda37c9