Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 15:34

General

  • Target

    03db8c5e65770fdb40be1c795b8a54f8.exe

  • Size

    2.0MB

  • MD5

    03db8c5e65770fdb40be1c795b8a54f8

  • SHA1

    dda076de9253bb4097329290c99f67961357e82c

  • SHA256

    68a47ccaba31522ec766feac5a117f9ee4197a16c5681fa55639c8717b1bdcb5

  • SHA512

    ae7b18e6c282aef32dc24aa4dcf009e6289de032b1845f019612405906c10f3d7fefdc5286b975826c60e77ee5289ddfeade9fa374b2743086d99ab0c69e9c35

  • SSDEEP

    49152:y1ORNReNPQ8vywYisX67FqTSDhBkYyK9L:N3sI8vyssX+wWDQnK9L

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03db8c5e65770fdb40be1c795b8a54f8.exe
    "C:\Users\Admin\AppData\Local\Temp\03db8c5e65770fdb40be1c795b8a54f8.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    91a7d1b4e016728a484d2bb3495ed5fe

    SHA1

    96a308de34c396e3e63dc439ed8ae787c24bf148

    SHA256

    71638a04f63792ec378d92271668c1aa52dcddae3b5eca7d7c2e1346b06dd31d

    SHA512

    c4f6f624193f487d15a5fb9b89f603a03cc2420f4e14a2b257156589e16b8ff723c8e3ba2926faf8315a399ddf1eb6c6d6cd292a160b1926a9678cd66c265487

  • C:\Users\Admin\AppData\Local\Temp\CabA9A9.tmp

    Filesize

    19KB

    MD5

    a5536ddf2fa8891eb295dee7f4cec5fc

    SHA1

    d052ba170ef609f529de07f8a46ac933bf00c5e2

    SHA256

    0f142ce012afc4e4243dfa59c5bcab15c594a9e2b527bf369e704dcdf86adf25

    SHA512

    50607f9b8364962c2ed37ce1ad4ab150f79abae05e7be50c65af52a691ab383786d01d72383c9427e949cadcde9164b0187d8ada83b0ec7a086d789525d459ce

  • C:\Users\Admin\AppData\Local\Temp\TarAA48.tmp

    Filesize

    50KB

    MD5

    1712eb16957fc3d8dcd4b72be062a29e

    SHA1

    1692dc501e66b7817abf6c0cff8871532da62f1d

    SHA256

    f5be2e0a2451245ef15fba62d3341198a8a8002779e12969de294315ece13933

    SHA512

    cc214e09466021990553346e6da28c4353e47defd297527a607126f7e2d31667a380053c9286c1fc3ed5fc3f0697f445c2e13a9f41a5fcf0aa5d7b53d16bcd87

  • memory/2176-160-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-180-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-1-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-0-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-6-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-3-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-4-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-86-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-157-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-2-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-161-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-7-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-181-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-182-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-183-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-184-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-185-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-186-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-187-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-188-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-189-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB

  • memory/2176-190-0x0000000000400000-0x00000000006AE000-memory.dmp

    Filesize

    2.7MB