Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    13/11/2023, 17:13

General

  • Target

    f13cf6c130d41595bc96be10a737cb18.exe

  • Size

    2.5MB

  • MD5

    f13cf6c130d41595bc96be10a737cb18

  • SHA1

    6b14ea97930141aa5caaeeeb13dd4c6dad55d102

  • SHA256

    dd7aaf7ef0e5b3797eaf5182e7b192fa014b735e129e00e0c662829ce0c2515f

  • SHA512

    ccd4f57b1af1f348fcf9f519a4789c04b499ac5e02ccb7333d0a42fa1cb1fdf9f969103b3a5467e278cd5c6cbbbbebaac4577d0c220e13335575a13408c79b48

  • SSDEEP

    49152:CC2s5FXQ4EmojLjCRELVf7Avil+dHIsLp1thIikN+6u2hs/:C6zX71oDCRAZUviAHImDqia7hs/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f13cf6c130d41595bc96be10a737cb18.exe
    "C:\Users\Admin\AppData\Local\Temp\f13cf6c130d41595bc96be10a737cb18.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\Broom.exe
      C:\Users\Admin\AppData\Local\Temp\Broom.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Broom.exe

    Filesize

    5.3MB

    MD5

    00e93456aa5bcf9f60f84b0c0760a212

    SHA1

    6096890893116e75bd46fea0b8c3921ceb33f57d

    SHA256

    ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

    SHA512

    abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

  • \Users\Admin\AppData\Local\Temp\Broom.exe

    Filesize

    5.3MB

    MD5

    00e93456aa5bcf9f60f84b0c0760a212

    SHA1

    6096890893116e75bd46fea0b8c3921ceb33f57d

    SHA256

    ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

    SHA512

    abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

  • memory/2304-5-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2304-6-0x0000000000400000-0x0000000000965000-memory.dmp

    Filesize

    5.4MB

  • memory/2304-8-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2304-9-0x0000000000400000-0x0000000000965000-memory.dmp

    Filesize

    5.4MB

  • memory/2304-14-0x0000000000400000-0x0000000000965000-memory.dmp

    Filesize

    5.4MB