Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 17:32

General

  • Target

    b73a110be47be39fcfdd029fbf2518a34daf5c98f193fe068462a66f7318e82a.exe

  • Size

    4.3MB

  • MD5

    38018ede4678b26cade455bd7ff0a4a7

  • SHA1

    bb0e9e260682ded69a90d66da1262a38bfd1d7fc

  • SHA256

    b73a110be47be39fcfdd029fbf2518a34daf5c98f193fe068462a66f7318e82a

  • SHA512

    b3b522f99211450d0d1877ae53b7a654159a0c25d79de58e36d8cf00cca680313222f7a1599a186158408368a97d63b7f045f4e0d0acebdba8f58687952b4c9f

  • SSDEEP

    49152:qMLPIdiWU/o5LcUekfbj+whw5+r5u8QeKxFOJxdb4vZKVB:bLPIAN/nUeKbj+UFKdzOJDb4v+B

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b73a110be47be39fcfdd029fbf2518a34daf5c98f193fe068462a66f7318e82a.exe
    "C:\Users\Admin\AppData\Local\Temp\b73a110be47be39fcfdd029fbf2518a34daf5c98f193fe068462a66f7318e82a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2224

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    1KB

    MD5

    165cc89a011c0f4042f48ff7413976b6

    SHA1

    4cd3ad219c7a2591a49f18742a53f40df2a91230

    SHA256

    04330bbdc947fd611021d95057af759c0ca2b1487ff0e9b68f631908e20650b7

    SHA512

    e81c230fff4088fe4b669e1c06aabb78b841286edb4937bf263d54526e0175a7c120c16bbb946587bdd401e0b45ff58d5b35e4baa59c1a865dda131daa506fd0

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    4KB

    MD5

    b682af7e0f5799ee52d5645f81508213

    SHA1

    80af8df38d8a3810c3797738814565bc29f99ccf

    SHA256

    bee69ae22966bc8fc388ee7e4b9f369ea9be0c2f7688dc92e4a8d7d5781db4ac

    SHA512

    92f7b542115a450cac5ce1a8371beaeb70244358f876808f8201f6cdca384b697e7ef4681d2bbb3f497b53680e21d3de0f5a85012747a4d6b0c2646ee44a9e09

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    c13b57d4ae2f1b08f2c78d366390982b

    SHA1

    872fc98cf2d039f674e18b0e04dc850dfea65ca0

    SHA256

    79ce0d08f17a981678fb4a7d44334a7a0f7270b971e0f9b7039c707da115ca69

    SHA512

    5705c1a1409504018bcb40b0b61ba7ddf0830966b692cbdab591c488a3f5bd14685451c5d43b3cd6217dc2104a50d8cee734012de8c67e07905c84bdbc2a96e4

  • \Users\Admin\AppData\Local\Temp\yb1A16.tmp

    Filesize

    364KB

    MD5

    c8aaa81ccdb96b1dad82d01afe6a5256

    SHA1

    589a405f5fce916e0607ef39e294ffec0dcfdb5c

    SHA256

    f552c69ffe5ee4b48fae3c48b8eb3d8511a3f43494731bc72b5e5ef13be03c82

    SHA512

    1347ec3ac440e15e2ee2226be3e46973604afe6d82df79aeade817aa801cfa18e456a1e14e84128169b10bc111eccb6f0f12c809b06feef5e8f6a461777401f8

  • \Users\Admin\AppData\Local\Temp\yb1A16.tmp

    Filesize

    305KB

    MD5

    1e9490b123689f77485fe3d49c8c1085

    SHA1

    d5b58a059f753aefcd75628c40c48ec51d3e79b8

    SHA256

    a78be0943dd6b8d69ec9f47cbaeeac238572f940204af93c5eb3c25cdb8fa102

    SHA512

    ac30138966306150e12094128589bd1a65103cffd997b94c9c045bfb3cbabfd9945b9639493af6aeb7d5d5eac4a58c28367425219b910b21022d859f028494bf