Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
9ab236bc174a73778cf3d87ba6574d1d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ab236bc174a73778cf3d87ba6574d1d.exe
Resource
win10v2004-20231215-en
General
-
Target
9ab236bc174a73778cf3d87ba6574d1d.exe
-
Size
1.8MB
-
MD5
9ab236bc174a73778cf3d87ba6574d1d
-
SHA1
c4a48c8bae5694a73d7b9bc4f498c7b210d6d819
-
SHA256
12ed3a9c702063e5caaeda763ac4b06a0f03b409d6f7795599ef954a84e1002e
-
SHA512
ce780d009ea2125d8f324a1b13fe1fc7d534da127444ecdaf26f5ba45389f33d3353aea3f364e7e9c754feefb334b168c7a1cda0168e1a73d3034c8d0ee908fc
-
SSDEEP
49152:LqIVuRTTJ6fFmhMMMMMMMMMMMMMMMMMMFMW5lNTmLsQHCBRes:LsUfFQMMMMMMMMMMMMMMMMMMFMclNyg1
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x003000000001272b-9.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1632 9ab236bc174a73778cf3d87ba6574d1d.exe -
resource yara_rule behavioral1/files/0x003000000001272b-9.dat upx behavioral1/memory/1632-11-0x0000000003D60000-0x0000000003DBB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main 9ab236bc174a73778cf3d87ba6574d1d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1632 9ab236bc174a73778cf3d87ba6574d1d.exe 1632 9ab236bc174a73778cf3d87ba6574d1d.exe 1632 9ab236bc174a73778cf3d87ba6574d1d.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a1df77479ce756da1471b637d02fa6c8
SHA160fdcd324f6f0bce932e1a7a5940a869ec7cf181
SHA256175e5f8ea54c5be289ddd15cc7a05fc250966ed4ea8e367e493f67485728c8c7
SHA51262a91224437cdc6e1beeb714c6c168cc05f765d2c22237e4470aa3e225b3c00459935410751b12c8575bdb873e4d5830119fe66574cc5d6f5be65344405ff8d6
-
Filesize
57B
MD5bf5b5ecb55075be619a4f362b33f4ec3
SHA1f9982e43e86a3ad006ab93dc76a9cd9d6eb5a6db
SHA256a05ba99a9f30e5b0fafd771456b3fba35ab8a9da76169b66ec0ed2da8cb6b264
SHA512fbef514ac129ca4f6f1245a74e2bb478f66a12422d705612440cc72b2cba628fec7232574febbdc612f55fb5cf74f94823aa7b898e8504a35aeeee5edcb5770d
-
Filesize
81KB
MD5e26e15fd410cbc6dd91bc243956c9846
SHA17ddcc0d23856fb9b3fafc2538e50a49edf52af01
SHA25640542e6dbffaf2b996eb4154d93f14d21546b3995bbc246dbe22cc9f85804d28
SHA512a1e2133a876ff47faa56139d26b5b2006fd7576f1d178996eff1d9c52bd2f961e10dc9ae63ac5f640db4b12980ade9211e7ecf836d684abcf64b0ec6e1be2a7c
-
Filesize
1KB
MD5ec60cbb4da421db5f7fdfcb9fdb0aeb9
SHA12c00748dfc8362a86e753472246f898f49574b37
SHA25645a98ea184110061447a02fc50d4a8c5c13b48b58dbfb56fbaab77cec75d0a7a
SHA512325743a83c3b06d6100f53afa574a94927f6c36ff1c00e78cbd98468257f092cd22db4709714b9e8e518da847298fba369503727612eeb737f72277817f759a9
-
Filesize
120KB
MD5c9f333d1ff898672a34805f94a265329
SHA12deaac66698fb2e9b3868d23034c3211c508b739
SHA25607e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b
SHA512048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add