Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 10:28 UTC

General

  • Target

    71fde528cb5b8c054c163b4dee2f695e.exe

  • Size

    94KB

  • MD5

    71fde528cb5b8c054c163b4dee2f695e

  • SHA1

    745eb0a909613a612e22345e478c167949529186

  • SHA256

    bf8737c19f3524d55476474700b5f329bbccb93cae13383bdcf33881bfb5487d

  • SHA512

    2e9f61b72c1035e43e077cb2f243427605665f1d16cb16f313db08b67050a62c0dda48a2993b4ac0bcb4141ea191ca4be34eec5e79b6653a72ec11d718c77085

  • SSDEEP

    1536:uoDbjEPwyUgtYqYSF9khAdHIFn8ccQIwUtiLuo:uyb+5YSFurcQIwUtiLuo

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 18 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71fde528cb5b8c054c163b4dee2f695e.exe
    "C:\Users\Admin\AppData\Local\Temp\71fde528cb5b8c054c163b4dee2f695e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\WINDOWS\SysWOW64\cssrs.exe
      C:\WINDOWS\system32\cssrs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\WINDOWS\SysWOW64\cssrs.exe
        C:\WINDOWS\system32\cssrs.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Suspicious behavior: EnumeratesProcesses
        PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\cssrs.exe

    Filesize

    94KB

    MD5

    71fde528cb5b8c054c163b4dee2f695e

    SHA1

    745eb0a909613a612e22345e478c167949529186

    SHA256

    bf8737c19f3524d55476474700b5f329bbccb93cae13383bdcf33881bfb5487d

    SHA512

    2e9f61b72c1035e43e077cb2f243427605665f1d16cb16f313db08b67050a62c0dda48a2993b4ac0bcb4141ea191ca4be34eec5e79b6653a72ec11d718c77085

  • memory/1084-17-0x0000000000230000-0x000000000024E000-memory.dmp

    Filesize

    120KB

  • memory/1084-15-0x0000000000230000-0x000000000024E000-memory.dmp

    Filesize

    120KB

  • memory/1084-14-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1084-20-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2132-16-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2132-21-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2152-0-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2152-12-0x0000000000230000-0x000000000024E000-memory.dmp

    Filesize

    120KB

  • memory/2152-18-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2152-19-0x0000000000230000-0x000000000024E000-memory.dmp

    Filesize

    120KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.