Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 02:08

General

  • Target

    79010143243eda1de643bb3d49d16d2d.exe

  • Size

    123KB

  • MD5

    79010143243eda1de643bb3d49d16d2d

  • SHA1

    d0ff3634e007f00c3b49a179416e8c5d7155afbb

  • SHA256

    4b844cf36afed61fdba88b1ac35ce8b6b56e52e61b756c2bb9690cd42ec27b60

  • SHA512

    d1ab358e69cad856c1d6c1d60236857481362c3f9108538afb719e4c997fdc3a3b95dcc42ea53ed9ac314e218749f2c015dadf38a8662efc1df843a2e55ca22e

  • SSDEEP

    3072:qp4QhJsxXYClfk6y6SyBgKGg/C2p6ztO73KpfsMhpqlA:LQhCpBOKQg3p6zQ7Wf22

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe
        "C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"
        2⤵
        • Checks whether UAC is enabled
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe
          "C:\Users\Admin\AppData\Local\Temp\79010143243eda1de643bb3d49d16d2d.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1720-1-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/1720-4-0x0000000000020000-0x0000000000021000-memory.dmp

      Filesize

      4KB

    • memory/1720-3-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/1720-7-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/1720-10-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2384-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2384-8-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB