Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 13:15

General

  • Target

    19a917845097178bc5f57ee02ad80ecf.exe

  • Size

    96KB

  • MD5

    19a917845097178bc5f57ee02ad80ecf

  • SHA1

    ec33bca996e459040235cc5b826c4f6512743a1b

  • SHA256

    f11c023d1521b70ccada725b2b006be7b2062d7d450530f448d01236a362d1a3

  • SHA512

    38f6efd126d057db42b86cfc92b3f952ced92309193d91fe3b4d82e8fe0fb621aa7860f548e2b4980dffd3ff845f3af7c68165cb033a3a464484c3388b1686c2

  • SSDEEP

    1536:ZURq3QMOCPjP3Jvl2vaksn/zfzjC/ho2DZSORQS7CmMm7PrL57VFy4I:bxP73V8a7/njr2DZSORQS7CmMgP44I

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19a917845097178bc5f57ee02ad80ecf.exe
    "C:\Users\Admin\AppData\Local\Temp\19a917845097178bc5f57ee02ad80ecf.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:2472
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:2
          3⤵
            PID:1232

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3064-221-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-222-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-314-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-316-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-317-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-318-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-511-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-515-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-516-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-524-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-525-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-532-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB

      • memory/3064-577-0x0000000013140000-0x000000001315E000-memory.dmp

        Filesize

        120KB