Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 01:21 UTC

General

  • Target

    09eba7c9b7b59d9062a89ad1d78da1d1.exe

  • Size

    13KB

  • MD5

    09eba7c9b7b59d9062a89ad1d78da1d1

  • SHA1

    6e4bded13a555f1f6f7268391339fdc1cae2b02c

  • SHA256

    e588d2be1892ffafe9ac9f9bba7372ef17b96d250224a6527f6127482395e9e0

  • SHA512

    018272f9e1d907d2bf615cd35993c9b99120a234fe99337ba1069b7fabfcd84bd72623f66c402e1122e7b39b80add98df97c8602b7c6f75d09b75137d1e70f28

  • SSDEEP

    384:ggdcIlAn5Rfkxz6T+Fb66hzQ5swC74w2/t:ggdcN5G56q66ksd74wYt

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\09eba7c9b7b59d9062a89ad1d78da1d1.exe
        "C:\Users\Admin\AppData\Local\Temp\09eba7c9b7b59d9062a89ad1d78da1d1.exe"
        2⤵
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2972
        • C:\Program Files\NetMeeting\ravdthxmon.exe
          "C:\Program Files\NetMeeting\ravdthxmon.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2832
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\09eba7c9b7b59d9062a89ad1d78da1d1.exe"
          3⤵
          • Deletes itself
          PID:2656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Program Files\NetMeeting\ravdthxmon.exe

      Filesize

      13KB

      MD5

      09eba7c9b7b59d9062a89ad1d78da1d1

      SHA1

      6e4bded13a555f1f6f7268391339fdc1cae2b02c

      SHA256

      e588d2be1892ffafe9ac9f9bba7372ef17b96d250224a6527f6127482395e9e0

      SHA512

      018272f9e1d907d2bf615cd35993c9b99120a234fe99337ba1069b7fabfcd84bd72623f66c402e1122e7b39b80add98df97c8602b7c6f75d09b75137d1e70f28

    • memory/1248-11-0x0000000002100000-0x0000000002101000-memory.dmp

      Filesize

      4KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.