Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
ca3d730a970c8976017c04f58c92af52.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca3d730a970c8976017c04f58c92af52.exe
Resource
win10v2004-20240226-en
General
-
Target
ca3d730a970c8976017c04f58c92af52.exe
-
Size
7.0MB
-
MD5
ca3d730a970c8976017c04f58c92af52
-
SHA1
e53b7cddd5a2d96b775cd6f247c046ed24a02b1e
-
SHA256
5080ed67e57475e333697442dc91ad803ed179fa5760ed69bec0114cee67c282
-
SHA512
1e74a70f761b4f0df39240c37451b043f020011e9c3d0ab3783b0665370d205fe1b72fa98d864b0f7edbdad92169e5d66e621af6ea9836fd3d05e23288f7bd84
-
SSDEEP
49152:EQFRHrmQG+yrjQG+yrmQ8QG+EQG+yrwQG+yromQG+yrtQG+EQG+yrwQG+yrP+yrE:EcKXipzM1JzMsipbsjN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 zj.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 ca3d730a970c8976017c04f58c92af52.exe 2020 ca3d730a970c8976017c04f58c92af52.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main zj.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 zj.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2736 zj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2736 zj.exe 2736 zj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2736 2020 ca3d730a970c8976017c04f58c92af52.exe 28 PID 2020 wrote to memory of 2736 2020 ca3d730a970c8976017c04f58c92af52.exe 28 PID 2020 wrote to memory of 2736 2020 ca3d730a970c8976017c04f58c92af52.exe 28 PID 2020 wrote to memory of 2736 2020 ca3d730a970c8976017c04f58c92af52.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca3d730a970c8976017c04f58c92af52.exe"C:\Users\Admin\AppData\Local\Temp\ca3d730a970c8976017c04f58c92af52.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\zj.exeC:\Users\Admin\AppData\Local\Temp\zj.exe -run C:\Users\Admin\AppData\Local\Temp\ca3d730a970c8976017c04f58c92af52.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD581cdbfc2fea046067f196870bb106a18
SHA1de68ded2c4b75a52b9307f384530559a5e986069
SHA25695cef7f43492faa3f0af08c6770aeabc69e6e39816744680d09024a115e16e97
SHA512993a10934b43d76e82e687cacdddad82260c2e5e5334343517aa93d72a807d279fad36eef01c45d3f69c1c974b8fd5a77ea40fcb5ca3ccb43d32e4641df48875
-
Filesize
7.9MB
MD5f5ebb93409fac2eaee948746f469c755
SHA1b2e60e53c795dcec27dd3837b4b4d2afdf4d7afd
SHA25626741fa0818d5688dfa53b2d5117330b0004515d131f9538a49a33e2e495041b
SHA51205c3520ea8256b3e3dc483ae967eb75c52272e4c54a01bce0b4e2a5ef1e9b9f957102559671a751a33f8569d7cdb50fb190f622498f4b06d638dd0a2d820894e
-
Filesize
5.7MB
MD59971c2bee9b594c5fc327583af4684c4
SHA1098bce0ab68c5262761c3f1c5367da528ca9256d
SHA2560769631b6ea5beacc2f51c52a20d1fb67b7cc818d6e935aef0b6840b155e1b1b
SHA51245cba30008c8a0d64cc3d517d2b0901159b0e23b69780e1f8193ebd1c085173763a1ae21c96664c62075056e7c1e8dc23ff56e5a2ba17dfcc4e80f835c8b67f4