Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
71aeace76a4c13c9dd7c25d2005ff116.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71aeace76a4c13c9dd7c25d2005ff116.exe
Resource
win10v2004-20231215-en
General
-
Target
71aeace76a4c13c9dd7c25d2005ff116.exe
-
Size
8.2MB
-
MD5
71aeace76a4c13c9dd7c25d2005ff116
-
SHA1
4346d248c97359c63bff060e4d45371dce3d4651
-
SHA256
0c9ec22d323b1b21f553c8d1844146819a3360f6a238040813773af9b04a1d6d
-
SHA512
f7b04497c68c9054f997ba3e992a8cdd4bbe6be869646cb48e445eba4b3552aa3397e06445106877db9428ece7aa52cf8c3cb822e2ac6018b3705f2ea0f59e20
-
SSDEEP
49152:EQFRHrmQG+yrY+Fr/rcrSIrSB+Fr/SB+FrNY+Fr/rcrSIrSB+Fr/SB+Fr/rY+FrU:EcKk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 yc.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 71aeace76a4c13c9dd7c25d2005ff116.exe 2172 71aeace76a4c13c9dd7c25d2005ff116.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main yc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 yc.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2840 yc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2840 yc.exe 2840 yc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2840 2172 71aeace76a4c13c9dd7c25d2005ff116.exe 28 PID 2172 wrote to memory of 2840 2172 71aeace76a4c13c9dd7c25d2005ff116.exe 28 PID 2172 wrote to memory of 2840 2172 71aeace76a4c13c9dd7c25d2005ff116.exe 28 PID 2172 wrote to memory of 2840 2172 71aeace76a4c13c9dd7c25d2005ff116.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\71aeace76a4c13c9dd7c25d2005ff116.exe"C:\Users\Admin\AppData\Local\Temp\71aeace76a4c13c9dd7c25d2005ff116.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\yc.exeC:\Users\Admin\AppData\Local\Temp\yc.exe -run C:\Users\Admin\AppData\Local\Temp\71aeace76a4c13c9dd7c25d2005ff116.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD5b69d3e90f4097e51da40c51506bb0b16
SHA146ebeeb58666d66393a9a3628bbb0abb81e3885f
SHA256a4861bdae26660bb94b8e452ef41a5ffa8ec702f08bfd5d6e78b4462f3901054
SHA51205ac250361779a5b682a667255f93e3b7471e7a82759baebbf6cac639f23ea447350640780b8e9819fc128b9e9514d893ea77f1f7f67c2c8c983c89af3513d83
-
Filesize
418KB
MD5bee043786be36ae3614d663620970c54
SHA158e0ec46062d980cbb68663386ede3ef594ca7b6
SHA25601e0326166493175decda8f7f5fdc38a1438986d91bda2348ea98839fcb63d71
SHA51240cb0aa1bd8a2852ed6aa4697c5c8a4afb857961ba29f1e1073dcd0950e082b3b81914dbb15a24db3be7a6c86b82756cb8645eef86b598cd6307185833798dae
-
Filesize
316KB
MD5440d192277a9af6f7aa1b81e25cff5a0
SHA184a04939e71f5bd4be900c8daa8a1614891b3ad7
SHA2563c303343250a9a8abcc007186b01188243eda1090e1a66f53d55a9d155673562
SHA5126d7078f1b514b15484abfd0ae36a75ee269ab9eefee04b129cd42fcd165a08d99e64e03e87a9c02437dad9e009d07c03cc96110e3ad3772dd42f5052957a1d30
-
Filesize
428KB
MD59715a601bca1c2108a6d5949ede3f1d1
SHA1cfe1474d2932888d2d61c9545d26affea45639af
SHA256925e608acadbc572ff2a71a1fc7c52e8f1a0e8c19917e8cd80d843a30fd3ab7e
SHA512fc528250358079aa0cbcec8015c9df1cdcb53b303c58d5185bff853b0fc409a3df2482ba4e1144216a3b3d646d172dee669f7ee25bb7cc99427b327e2984b70c
-
Filesize
358KB
MD5fbad625fa3ec253e4f053d78119bbe77
SHA1ce494954324a86d8ede0ab065d7bd84803df743d
SHA2568188ec62d1064b76a240f6cd0e70d00ef43b59590b085a7eb912d4a669e85588
SHA512284016fbba6dc8249390b6281c4e400908105bc35fc8c2971d587c7e15d8f8c7d14d6e40aca82a92563f733ae39178f276d300dbb0afc186bda8141b90357b93