Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
7768f9c57cd2de0e804964255897f192.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7768f9c57cd2de0e804964255897f192.exe
Resource
win10v2004-20231215-en
General
-
Target
7768f9c57cd2de0e804964255897f192.exe
-
Size
27.2MB
-
MD5
7768f9c57cd2de0e804964255897f192
-
SHA1
4f4efaad50360160953fc1b7e407834690214c9d
-
SHA256
1c6fd6d00b1113dd28a1ead3ca1cce7d1cbaab10d661689cbf34306c9ca810e6
-
SHA512
830f8f3b9aaaf660e1eabe82e8eb3250620b51e95ec9778b4812e83be92951ae82b795f30c09068a3a551bf8f3a9389c05deec3ea63000641d675451549f2cb3
-
SSDEEP
98304:EcKApKAHApcApKA08AtApKAHLpcApKA08AtApKAH4HApcApKipcApKA08AtApKAR:ET
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 somt.exe -
Loads dropped DLL 2 IoCs
pid Process 2044 7768f9c57cd2de0e804964255897f192.exe 2044 7768f9c57cd2de0e804964255897f192.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main somt.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 somt.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2744 somt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2744 somt.exe 2744 somt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2744 2044 7768f9c57cd2de0e804964255897f192.exe 28 PID 2044 wrote to memory of 2744 2044 7768f9c57cd2de0e804964255897f192.exe 28 PID 2044 wrote to memory of 2744 2044 7768f9c57cd2de0e804964255897f192.exe 28 PID 2044 wrote to memory of 2744 2044 7768f9c57cd2de0e804964255897f192.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7768f9c57cd2de0e804964255897f192.exe"C:\Users\Admin\AppData\Local\Temp\7768f9c57cd2de0e804964255897f192.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\somt.exeC:\Users\Admin\AppData\Local\Temp\somt.exe -run C:\Users\Admin\AppData\Local\Temp\7768f9c57cd2de0e804964255897f192.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD597fa25904f2a7c981476451d0c0de07f
SHA1f7c158220e6397aa498e7903429a9be6431b278f
SHA25656091f7b60a2748a6b1d61a9f0789a4ff828c0d99043fb504b76f427a765eb06
SHA51233dedc016040a1a74ee8cb6230de1ab708e3b4d20224eafa084c7a0101070b4bdc2341b80b4337929e2720b0d016d037e9d54885d001b675a3f4ce18a62853a4
-
Filesize
82KB
MD531a6c38a1de5edf7f641aa3633d77829
SHA11441b6b015e47222bcac56612b737d812fedc98d
SHA256373af79e353b73d2ef940cb0ce7004d14dd10431f0eb85582e8bf7b2b7abd39f
SHA51274a0094992acd2765ab94fe35c44ab1fd7d19421ed1dcff1326a2438303272a6ee6c376b55964420858e85703209de0206d32fc0083b878df9c008d3cae62aeb
-
Filesize
74KB
MD5920bd6e25df561cf40b41d0e35c02a88
SHA198e15884c7b08834a5ca06b8f53f996276fa7214
SHA25624d1766675b249588f2b6119f96862fe07272dd9698898d847f8483770e83a36
SHA512b7942ef461e47844e67959a775af13f1715b28e3f3aabcdf3769a1ec89e41ac807bfcd6cf2be28c5a0593a97c94f0852cba297283ba48330e3e286b64a3ce1f5
-
Filesize
63KB
MD5a2bef27c204f5215ff261faed36fa15d
SHA1aec8f3c4a9219916d4d2cc428c06c1e52be0851f
SHA2567f26334e98f657fc4bdfe71b5ff3deab8615f53f95a27eef77e44076c54cdc62
SHA512b646a8072b2439895c2c86229a477b49122ee3115c714ea73f7f38e5c777c85f57e806caf3e4e86ff638a29a9f20c47a9a82552a9b4aeea530dbac78dd95649d
-
Filesize
85KB
MD599fea46447b557895ec99fb0c0949e13
SHA1aaa07d43531750e21e456f147cc3d60d299d51a1
SHA25661870886b3395558a4b877fd8df3bea603751fc0076fbb4eeef7bc368d757a5a
SHA51228ae98b00b7d2ce1d666aff3d71f35028e12f3b574c1ce48d5fe5a38f9b7f9e5399f4d61aa5044b2e0c38f0b4cd260db04bb8a224630f733e00adb0bf198ad3f