Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 19:48

General

  • Target

    3926bbf94560b84c49335f7a7bcddf9e.exe

  • Size

    14.9MB

  • MD5

    3926bbf94560b84c49335f7a7bcddf9e

  • SHA1

    c1b1a50bc2ca474461a23960d58bde097c463a5f

  • SHA256

    bb8da044da7e04f0c40bb62daf2c2ea58e1c287ab6089810b2d5614991541a1d

  • SHA512

    e0c522dd818431dd15de8d0ae168756820c13b0b59642fbe0d47e4c3506eb702c9d31b91286a12e428b82e68767e79e0431f20beb3e6488945e760a2eb0b5463

  • SSDEEP

    393216:+YB93E8VxOa43LIzCvXGnY019JxYCv1fAlTOpD8:+w93E8Py312Rf9f

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3926bbf94560b84c49335f7a7bcddf9e.exe
    "C:\Users\Admin\AppData\Local\Temp\3926bbf94560b84c49335f7a7bcddf9e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\3926bbf94560b84c49335f7a7bcddf9e.exe
      "C:\Users\Admin\AppData\Local\Temp\3926bbf94560b84c49335f7a7bcddf9e.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI22442\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    18KB

    MD5

    f62b66f451f2daa8410ad62d453fa0a2

    SHA1

    4bf13db65943e708690d6256d7ddd421cc1cc72b

    SHA256

    48eb5b52227b6fb5be70cb34009c8da68356b62f3e707db56af957338ba82720

    SHA512

    d64c2a72adf40bd451341552e7e6958779de3054b0cf676b876c3ba7b86147aecba051ac08adc0c3bfb2779109f87dca706c43de3ce36e05af0ddee02bbbf419

  • \Users\Admin\AppData\Local\Temp\_MEI22442\api-ms-win-core-file-l1-2-0.dll

    Filesize

    18KB

    MD5

    49c3ffd47257dbcb67a6be9ee112ba7f

    SHA1

    04669214375b25e2dc8a3635484e6eeb206bc4eb

    SHA256

    322d963d2a2aefd784e99697c59d494853d69bed8efd4b445f59292930a6b165

    SHA512

    bda5e6c669b04aaed89538a982ef430cef389237c6c1d670819a22b2a20bf3c22aef5cb4e73ef7837cbbd89d870693899f97cb538122059c885f4b19b7860a98

  • \Users\Admin\AppData\Local\Temp\_MEI22442\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    20KB

    MD5

    588bd2a8e0152e0918742c1a69038f1d

    SHA1

    9874398548891f6a08fc06437996f84eb7495783

    SHA256

    a07cc878ab5595aacd4ab229a6794513f897bd7ad14bcec353793379146b2094

    SHA512

    32ffe64c697f94c4db641ab3e20b0f522cf3eba9863164f1f6271d2f32529250292a16be95f32d852480bd1b59b8b0554c1e7fd7c7a336f56c048f4f56e4d62f

  • \Users\Admin\AppData\Local\Temp\_MEI22442\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    18KB

    MD5

    d699333637db92d319661286df7cc39e

    SHA1

    0bffb9ed366853e7019452644d26e8e8f236241b

    SHA256

    fe760614903e6d46a1be508dccb65cf6929d792a1db2c365fc937f2a8a240504

    SHA512

    6fa9ff0e45f803faf3eb9908e810a492f6f971cb96d58c06f408980ab40cba138b52d853aa0e3c68474053690dfafa1817f4b4c8fb728d613696b6c516fa0f51

  • \Users\Admin\AppData\Local\Temp\_MEI22442\ucrtbase.dll

    Filesize

    992KB

    MD5

    0e0bac3d1dcc1833eae4e3e4cf83c4ef

    SHA1

    4189f4459c54e69c6d3155a82524bda7549a75a6

    SHA256

    8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

    SHA512

    a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

  • memory/2672-134-0x000007FEF4EC0000-0x000007FEF5690000-memory.dmp

    Filesize

    7.8MB