Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 13:10

General

  • Target

    b77a65cb83a48b7dc5ce27859b7df5a8.exe

  • Size

    204KB

  • MD5

    b77a65cb83a48b7dc5ce27859b7df5a8

  • SHA1

    53c01879011875968c492e0a62f65d9f3435f109

  • SHA256

    a01209d4b882bf08c9e9a2a2a9c77fa1b3cdfb87c1b33930049c3566b22f8bae

  • SHA512

    493922f4f825dbc8bc71baee0681a711b46ad1f0634d21220f1bb44c345018e579eae30890a6f213761303daa376b6c678c11ab55939f615b59baf008422918e

  • SSDEEP

    3072:Uu5d+CraZJOJQ7Nl9Q6dTnmkiwgwWfN4+uj64Oj3:SvkQWQmCV45uj64O

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b77a65cb83a48b7dc5ce27859b7df5a8.exe
    "C:\Users\Admin\AppData\Local\Temp\b77a65cb83a48b7dc5ce27859b7df5a8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Roaming\svch0st.exe
      C:\Users\Admin\AppData\Roaming\svch0st.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:1432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\dir3

    Filesize

    70B

    MD5

    6101bc3b396c63f1f6518c47d0dd3197

    SHA1

    bf3990f91b266bd7d6fb93e17d54b4adba79100a

    SHA256

    54197866f9c6d0ee94863bf976b4573520019dc7f85d9060fcfe6cdd8e7a211e

    SHA512

    556146bfc7b6cf3711dc7abcca7c446a0ea420d9cfed23111f9eca1b97ed04cee7e02ad4a0c8f350132086b8b516fee9803728366b6f1dafd7b7804118ec280b

  • \Users\Admin\AppData\Roaming\svch0st.exe

    Filesize

    204KB

    MD5

    b77a65cb83a48b7dc5ce27859b7df5a8

    SHA1

    53c01879011875968c492e0a62f65d9f3435f109

    SHA256

    a01209d4b882bf08c9e9a2a2a9c77fa1b3cdfb87c1b33930049c3566b22f8bae

    SHA512

    493922f4f825dbc8bc71baee0681a711b46ad1f0634d21220f1bb44c345018e579eae30890a6f213761303daa376b6c678c11ab55939f615b59baf008422918e