Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/01/2024, 09:17

General

  • Target

    7f76aa85e20777f406a8d65a10ed4875.exe

  • Size

    312KB

  • MD5

    7f76aa85e20777f406a8d65a10ed4875

  • SHA1

    b56ee2cd93cfd5c393f618b22c32de0942e66c16

  • SHA256

    241014afd1932118e3253f5c74501aec6f573a379199a038ed1043296730713f

  • SHA512

    8919bbcc158e45f9d54772ce903d100069e2a2870070574f0542c5c67a7d5640b6e154d9227fec41e9e2704510a2ac6caadd5ba52e3a9833b96d0523995422c9

  • SSDEEP

    3072:qwbqks+CRoRHf/00jN/wfLERR8zsH1j0JsYUncjIdqIdpYGLcgcO9U004NOFVqDo:qweks+CRv0mfLQ8zW1Osdnp1t993cYgn

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f76aa85e20777f406a8d65a10ed4875.exe
    "C:\Users\Admin\AppData\Local\Temp\7f76aa85e20777f406a8d65a10ed4875.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bhs780.tmp

    Filesize

    242KB

    MD5

    2d624279cf930ac204f8d9c9c5370d53

    SHA1

    94ced8f710684026c4d6276b5233ea03d54a1d93

    SHA256

    8f6306f6fdca3387a7a4f825122fee6a07b37b1eb3c15242d51c2930e31bb81d

    SHA512

    f35801b1149d4b4ffdb21056b26b06ba116c3402b0e863c4acf0cfe57e20079a1aaaa1f064998d8fd27d6194382d7a1888c8df804441d68d8d231723f7500e57

  • memory/1460-2-0x0000000000530000-0x0000000000572000-memory.dmp

    Filesize

    264KB

  • memory/1460-3-0x0000000074AD0000-0x00000000751BE000-memory.dmp

    Filesize

    6.9MB

  • memory/1460-4-0x0000000001030000-0x0000000001070000-memory.dmp

    Filesize

    256KB

  • memory/1460-5-0x0000000001030000-0x0000000001070000-memory.dmp

    Filesize

    256KB

  • memory/1460-6-0x0000000001030000-0x0000000001070000-memory.dmp

    Filesize

    256KB

  • memory/1460-9-0x000000000AB20000-0x000000000B2C6000-memory.dmp

    Filesize

    7.6MB

  • memory/1460-17-0x0000000074AD0000-0x00000000751BE000-memory.dmp

    Filesize

    6.9MB

  • memory/1460-18-0x0000000001030000-0x0000000001070000-memory.dmp

    Filesize

    256KB