Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 23:27

General

  • Target

    4770b1b34dd46ebbf01d2aae352cd199.exe

  • Size

    11KB

  • MD5

    4770b1b34dd46ebbf01d2aae352cd199

  • SHA1

    ad4d4e37a5c071c3f0ca064bae415a5f1e7f53bb

  • SHA256

    90321be8cee235e44256be0128519bca1eaebf5b52880a1c0d9b3d087795c489

  • SHA512

    7ff45339d8d1f1a91e8388d27c94672d9989b20eb65c147d6e0d0ca64cccc5f66295ba4e2dab4cff46e8665c71208f304b7a2d3579714cd22346f9004dff4b30

  • SSDEEP

    192:Iuh4jDHPGc0eFNzdXYmpE3pTmTIWU8HWqOANOXMde61EattPmXFNYf+553N5kVmm:mjDOc0eb6m8ZmT3U4Wq9O9+EUtPSFNYn

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4770b1b34dd46ebbf01d2aae352cd199.exe
    "C:\Users\Admin\AppData\Local\Temp\4770b1b34dd46ebbf01d2aae352cd199.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\DEEA.tmp.bat
      2⤵
      • Deletes itself
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEEA.tmp.bat

    Filesize

    179B

    MD5

    cc18dd1180d972b944d9adb3627fcab8

    SHA1

    8c75b492b1e3b9ccf3d60d9abdd90bc8136e4009

    SHA256

    7f5b3f0020be23a8b657d8649688fb70fc24b90497074cf6c100a7296b97303e

    SHA512

    1569074aabf4dd6d39487ca142baba9dbeaf04ec4a40d161ebcb806137fa9dd003543568fa9461fac4c5ea1f2808d41c6ba6dfbcf0562657e69b8edf19a5107f

  • C:\Windows\SysWOW64\kbdswjr.tmp

    Filesize

    967KB

    MD5

    0527372008b21552b41ddf4a6e0319d1

    SHA1

    a7ce48002235d13d954da439e8f11a326661058d

    SHA256

    f01152ffe16b617f512f7a2a215260c3c9fd45bd8d6369b076b4e5a7031100d8

    SHA512

    d00d3dceb8f403fadf82ce55ad30406535806828546e65844a882a4d8e53a476726a7a20f390215c0134851259d5086e1870319a3a85fe833aa364897217ebec

  • memory/2540-12-0x0000000020000000-0x0000000020008000-memory.dmp

    Filesize

    32KB

  • memory/2540-22-0x0000000020000000-0x0000000020008000-memory.dmp

    Filesize

    32KB