Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 00:50

General

  • Target

    c7441e08aa4bde63f234a7c674ead91a.exe

  • Size

    2.0MB

  • MD5

    c7441e08aa4bde63f234a7c674ead91a

  • SHA1

    38159e227cc992a79b0210d8a39df4a2677692b1

  • SHA256

    bcf4da127174d250938aa4e070a58803d9efe82127af5e0aca2c860ed8bad7ff

  • SHA512

    8620a7b79ceb4879de78061144903fe3345dacd64a23e871d424b8b215bd71fdee8e3255a0b6bce5b2b8fde8a1aa3d25356c22c93d9d97b2eb531994193ece03

  • SSDEEP

    49152:OFUcx88PWPOpX0SFhxmf8kIcyQD7tDmrwx+iqCRIyGc:O+K88uPCHjxmFIrQDJDlgf+IyGc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.exe
    "C:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\56B8.tmp
      "C:\Users\Admin\AppData\Local\Temp\56B8.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.exe 7EF53B2FF5B0581A1FF1733CE6B84D41078FD0F312AA57A81B312D9C2AF8A938F2D0E9BBC20CE9BAAE2E3DBB62D30D3F5AA126479EE75559322BD13ABE764978
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.docx"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c7441e08aa4bde63f234a7c674ead91a.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • \Users\Admin\AppData\Local\Temp\56B8.tmp

    Filesize

    2.0MB

    MD5

    7fba040246d66021871bf61b85bbffa5

    SHA1

    ca9c8839a152bebb68301f39de1dc0a0958d3232

    SHA256

    4c88040c234cda9ddfe1d17027e431ef0b4505c20fb49504dcd61af0f9870f5a

    SHA512

    37f587c31e96171e89f4a1dd3bc1e319f4ba4e53fb2d5abb3b819603262c9faf7c113f5c02ecf800d69b4ba507607b2590ddfd10c8acab89949bdbe59bd7f2c3

  • memory/2216-9-0x000000002F6C1000-0x000000002F6C2000-memory.dmp

    Filesize

    4KB

  • memory/2216-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2216-11-0x000000007129D000-0x00000000712A8000-memory.dmp

    Filesize

    44KB

  • memory/2216-15-0x000000007129D000-0x00000000712A8000-memory.dmp

    Filesize

    44KB

  • memory/2736-6-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2940-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB