Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 17:45 UTC

General

  • Target

    093482ba49649454005a286b63314bee.exe

  • Size

    120KB

  • MD5

    093482ba49649454005a286b63314bee

  • SHA1

    4418282b6a8ff59b14f34bc7a0b0deabb61af1f0

  • SHA256

    77e515cd40dba7f6d5389f0b4547e056c3d26373ee9d7878d4d0836fb2487d73

  • SHA512

    3de62cfd5b7c0abae9d8b28d478eed18db8cbfebe0b7c6f80f1c4f6d3da7e7fcd4616f424e41f0b01ee6847f9ee276cc2d62a1fa3c63252108b89d569f6f34a2

  • SSDEEP

    1536:/SjaDCgzh/pwY5tk+Xdu1jozq3z1bBR9CgGEi1xtTucxLCdP0YuYQGu41XAtt:Djoqtk4du1vJ5l7i1zLcMYuYBCH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\093482ba49649454005a286b63314bee.exe
    "C:\Users\Admin\AppData\Local\Temp\093482ba49649454005a286b63314bee.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\2.exe
      "C:\Windows\2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2492
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 148
    1⤵
    • Program crash
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\2.exe

    Filesize

    45KB

    MD5

    78fc9cccfb9b443b4ec20e0e9cceec16

    SHA1

    bd85f68629222166d3618f7abb8eaa625ad2d361

    SHA256

    18a93c6485ea3b26288a06bd71b89ec6935ed11d992becbe2ccc98b7bc98c995

    SHA512

    125793b9cb9c87329b4931707f86cc562b5b87f936d2e16a83e8b1e28d963200439f29699f6dedeb2607f6b18712f196566b594e5494b2d502f50dd9f09f1698

  • C:\Windows\2.exe

    Filesize

    24KB

    MD5

    49c318a4db52730bd3454e9af606b42e

    SHA1

    b1b37158cf5f2f5cd755e7f8ac084d367519eb19

    SHA256

    35e848c4c666cc8a1abbd56bb748e19145ca298ca87e723134a41884ee75900f

    SHA512

    3e64275840f4b6345135340659bcd13dc15e479e56df65ca1c2e242e82bd21135cce06f20736cdda22a74ab491b997cef7b2acb1941395044616419d35597835

  • memory/2232-5-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.