Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 08:35

General

  • Target

    ab5134dee7794f019a8ec886084a3245e42a4886412d6f2f12e814453668336b.exe

  • Size

    1.7MB

  • MD5

    4c51d84f540e76e0dc6e5eb4b080d7e3

  • SHA1

    ddea9157f11fd358cb5d35d08038a224dfe832ba

  • SHA256

    ab5134dee7794f019a8ec886084a3245e42a4886412d6f2f12e814453668336b

  • SHA512

    33cb7772b2c9d0c5f63df4b0c6660a746de3729e092c0e9c4722f1e3a11ad508b38ac7e1cb15e2820beb475095b8304d7a7aa358d5706b172f4c7cb2f3ecd9f7

  • SSDEEP

    49152:cA1qm3QQO4CTVW1WRk6J9IlGXT5XboZ4:NkM1W/I4D5roW

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab5134dee7794f019a8ec886084a3245e42a4886412d6f2f12e814453668336b.exe
    "C:\Users\Admin\AppData\Local\Temp\ab5134dee7794f019a8ec886084a3245e42a4886412d6f2f12e814453668336b.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c58c8d00b65a41e85826008a9b2179d8

    SHA1

    4fc4a8fcf80d2e12521eca959d2ac82507aa3a84

    SHA256

    9bffffb002839e70bacb9fefa20be579665d9d5be798f767263e037a3a64b956

    SHA512

    78a63aee3ceff23d6fbd9a5c3bf5c1b29be0cec4c35c3dd55aeda35918cc8e72f0b4493b553b5b1f6bb46f46378347e08b632b2ba2abc424f19cd8cc4b9c9ca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    1a2115ae9a250f8ca394b0ddb2e874c1

    SHA1

    00fe944acea13368886b55dabbcd2daf1d1dfa45

    SHA256

    6d571016f0f6a5b2d6353d842b24cdd48538c71c27e2ff14802ef05b33c80c45

    SHA512

    610175b2c416961c0885c07e4533b5b24d7cca8ccce8dc9bdb219a7a0efd54ce5541471904ccfb43351d49eae407efdbf23d606d73d7d2de36744b8c557ea5c8

  • C:\Users\Admin\AppData\Local\Temp\Cab1832.tmp

    Filesize

    30KB

    MD5

    da492d2a8b30a52d13309d8cca7dba37

    SHA1

    50a57d959a81f4cfeee2efe7ee56d83e0febabcb

    SHA256

    eba3446021cb1197b8274a57a340abbe40dbe7916387e0b6787f1a6514609bdb

    SHA512

    a605bbb1340a55175b59eaf7650a1f3d68bf24b30fa491d9c0096ed075e373b5a6b81f72a11e48412f7901b96d49597fbd3f69cbc9533a1b0aaa9eafd7c02bbf

  • C:\Users\Admin\AppData\Local\Temp\Tar2D2D.tmp

    Filesize

    12KB

    MD5

    80e1b15e8a178c0c24d6ba8c30bade7e

    SHA1

    009140885a8ca8aac5766d89b8ebb0d2f35d2815

    SHA256

    0934755dc680d1a1b1ca2c502533827c54bf320bd5505704a39619d9a2178a83

    SHA512

    4e7a06a6b2f66468326b3f0e45371c67b05bc1bf873d2b2455d44bd0d88be07a2ae013fa1cc85bbb8898a247922c78524436e79a09b4a802d326145ef17882a3

  • memory/2172-6-0x000000001B020000-0x000000001B0A0000-memory.dmp

    Filesize

    512KB

  • memory/2172-5-0x00000000021F0000-0x00000000021FA000-memory.dmp

    Filesize

    40KB

  • memory/2172-4-0x00000000021F0000-0x00000000021FA000-memory.dmp

    Filesize

    40KB

  • memory/2172-10-0x000000001B020000-0x000000001B0A0000-memory.dmp

    Filesize

    512KB

  • memory/2172-0-0x0000000001D00000-0x0000000001D34000-memory.dmp

    Filesize

    208KB

  • memory/2172-1-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-3-0x000000001B020000-0x000000001B0A0000-memory.dmp

    Filesize

    512KB

  • memory/2172-2-0x000000001B020000-0x000000001B0A0000-memory.dmp

    Filesize

    512KB

  • memory/2172-146-0x000007FEF5F70000-0x000007FEF695C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-148-0x00000000021F0000-0x00000000021FA000-memory.dmp

    Filesize

    40KB

  • memory/2172-147-0x00000000021F0000-0x00000000021FA000-memory.dmp

    Filesize

    40KB