Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:35

General

  • Target

    Pink mIRC/mirc.exe

  • Size

    1.9MB

  • MD5

    eb59ed343249f98951f51b3e3b4d4457

  • SHA1

    4a2cd30e91e578ec205cc1b282850e2563c68e01

  • SHA256

    d297591ff7a11fed40461d5dbac48663f09ab1adc0a1477d25b71eec80608142

  • SHA512

    9fb265ad9a3e2e6e393106f649c6d8d97020263db741747176706b29469c861278db4b730845fcce9eaacab6b08b641f979b02111f6846e420d2831af704826c

  • SSDEEP

    24576:zt+PGXJIYJgv8E32bpXnKKLA3FEQTdHUOD0/WkdmKaMaAh8HjF0:pJXJQ32l3tLtIHXAOkdm32

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies registry class 40 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pink mIRC\mirc.exe
    "C:\Users\Admin\AppData\Local\Temp\Pink mIRC\mirc.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Pink mIRC\chat.ini

    Filesize

    5KB

    MD5

    d6e3d757fdbd4d36dbc6179487e59c2b

    SHA1

    133949bc5667b11b10d40b92b6c59e6710247fd2

    SHA256

    76a21d800405fa3cd71ddd3c64a3316db93f3adb8acf6d8a0e33a5fe2da4d140

    SHA512

    79053d46bd94f82b32e123ec9d89b3b0979b88d784b114816864b05c69583d4bfa14c31e6250faa8c81bb70ba1c20f78a08132ee1047a1d8e51fa837e7f32e67

  • memory/1236-168-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-169-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-170-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-171-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-172-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-173-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-174-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-175-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-176-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-177-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-178-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-179-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-180-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB

  • memory/1236-181-0x0000000000400000-0x0000000000600000-memory.dmp

    Filesize

    2.0MB