Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 20:24

General

  • Target

    0305f0fae4e465eb05ec7b6484b7f212.exe

  • Size

    156KB

  • MD5

    0305f0fae4e465eb05ec7b6484b7f212

  • SHA1

    641b85868ea5da90b1d71de7ef63b21484e2dc58

  • SHA256

    4cf7cdca827acaf3e8881099a4296976f66bf40e0a435b2075888aa1578b0384

  • SHA512

    dc980d71a3dfa39bf7a84c0c4e9df0a2164c2ceb053bd4f54268570b0d56980832bd69ab394da875c17b084593426e32e57b2ce6a3ede65d88c6b597404de71a

  • SSDEEP

    3072:yBd11E2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANQ4oQZiEcS2Dym:QdrE2R7Qvb4tQTaCeFP4AqWMb

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0305f0fae4e465eb05ec7b6484b7f212.exe
    "C:\Users\Admin\AppData\Local\Temp\0305f0fae4e465eb05ec7b6484b7f212.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\yoiqac.exe
      "C:\Users\Admin\yoiqac.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yoiqac.exe

    Filesize

    156KB

    MD5

    4e89960e895e896a6254ce5b577f24df

    SHA1

    da0a1989043099d03623068e5caa023c90b8446f

    SHA256

    5a61bae536af3443a5b2a56d94399e14c13598fef6199dca551740b7a7c75753

    SHA512

    e21b6db10db3e540e5de2038dec5d945e4ef3bdaf976c6640a192d2000b0a757841fbe2ca706b4896bbc5a79b7e5cd22ed679d396f1c94812bb2154333fc17a9

  • memory/1976-17-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/1976-23-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2512-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2512-15-0x0000000003310000-0x0000000003337000-memory.dmp

    Filesize

    156KB

  • memory/2512-14-0x0000000003310000-0x0000000003337000-memory.dmp

    Filesize

    156KB

  • memory/2512-20-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2512-21-0x0000000003310000-0x0000000003337000-memory.dmp

    Filesize

    156KB

  • memory/2512-22-0x0000000003310000-0x0000000003337000-memory.dmp

    Filesize

    156KB