Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 22:18

General

  • Target

    1526b2bee89f9fc940ae4a0f8e110f6f.exe

  • Size

    955KB

  • MD5

    1526b2bee89f9fc940ae4a0f8e110f6f

  • SHA1

    9bea8fa264ea4d0a66674577053329947ede29ca

  • SHA256

    4ae39e5b8702915eeadfa571067cade17016990fc229c38d1b29e25252cef4c1

  • SHA512

    488c469aa0698f94215fd04afcbf297a1180ec938871e49709dffbbd3d460851a952b945946329908135fcfcec8f4e119cb80719e6aad3f63ce3038707a682b7

  • SSDEEP

    24576:4epzFWcoV7h4g2HCO5BHUEfJkLBiQBnxjb1uK9:3Wc+18NUEf21Ku

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1526b2bee89f9fc940ae4a0f8e110f6f.exe
    "C:\Users\Admin\AppData\Local\Temp\1526b2bee89f9fc940ae4a0f8e110f6f.exe"
    1⤵
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1526b2bee89f9fc940ae4a0f8e110f6f.exe:typelib

    Filesize

    8KB

    MD5

    20af680f2f10bf058c9bad9340b97122

    SHA1

    5fdead6b85919939ed320ea24c6b043e21da77ce

    SHA256

    b39683accb7dfffba1fb4280b6d9ecbff543ef7ac1ff993c81625fc0aadc5c37

    SHA512

    1e2d9a17186cbb5c7182925e193656a7dbcb7da06b42c4216007373010b9ebc16d2b5eb21684b91d9194ff53b641bf1655b77b55e80e5681796a6a2019d23073

  • memory/2040-0-0x0000000000300000-0x00000000004E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2040-6-0x00000000005C0000-0x00000000005C1000-memory.dmp

    Filesize

    4KB

  • memory/2040-13-0x0000000000300000-0x00000000004E3000-memory.dmp

    Filesize

    1.9MB