Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
cdc3055f5ab61455bf0fde644b4c753b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cdc3055f5ab61455bf0fde644b4c753b.exe
Resource
win10v2004-20240226-en
General
-
Target
cdc3055f5ab61455bf0fde644b4c753b.exe
-
Size
7.8MB
-
MD5
cdc3055f5ab61455bf0fde644b4c753b
-
SHA1
bcdad3f060f2a235db6103ba5b78bd3e05993bae
-
SHA256
585df7525308c52d45f5a8b25ba8d624e82093d493d3fd0dd1dfe64cc7e3209a
-
SHA512
939bcd4adf678285cd12e087e0268687038ca576e4ac2c8bb1e7c1b4eabb09352f731b8a9ede614e05f3e62e26a4a4d49dfedb57a3a6852489ca413ec88b7513
-
SSDEEP
49152:EQFRHrmQG+yrY+Fr/rcrvqrmQG+yrY+Fr/rcr7G+Fr/rcrxrmQG+yrY+FrFfrxrX:EcKYOMQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 ahmr.exe -
Loads dropped DLL 2 IoCs
pid Process 2212 cdc3055f5ab61455bf0fde644b4c753b.exe 2212 cdc3055f5ab61455bf0fde644b4c753b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main ahmr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 ahmr.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2568 ahmr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2568 ahmr.exe 2568 ahmr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2568 2212 cdc3055f5ab61455bf0fde644b4c753b.exe 28 PID 2212 wrote to memory of 2568 2212 cdc3055f5ab61455bf0fde644b4c753b.exe 28 PID 2212 wrote to memory of 2568 2212 cdc3055f5ab61455bf0fde644b4c753b.exe 28 PID 2212 wrote to memory of 2568 2212 cdc3055f5ab61455bf0fde644b4c753b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdc3055f5ab61455bf0fde644b4c753b.exe"C:\Users\Admin\AppData\Local\Temp\cdc3055f5ab61455bf0fde644b4c753b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\ahmr.exeC:\Users\Admin\AppData\Local\Temp\ahmr.exe -run C:\Users\Admin\AppData\Local\Temp\cdc3055f5ab61455bf0fde644b4c753b.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD546735dc71bb0cd9e1e91e0a867dee954
SHA17a9633edfe9c2e7541d7e6f03d0eac9e55b3b2e9
SHA2565afd2d2400edf361018a8123694cd9816852bedf29b03be64e46be27f3a5ce12
SHA512d071c9d0e3004cb4fb0d55a20bce6d1b75c43356d63cc430bc12f2fa4e35e51dfffa70202f23a06d7ca21cac1b34050f29431944af762b654c872662e3803f7d
-
Filesize
2.1MB
MD572a413b0f57eb6e47a7382273b2991c1
SHA17fb52864ffc408dc5c5913c34c75907cdb2a2f96
SHA256f189ea3f59eefc08ff5a04bb4aa1868a251461533e3fc090a9ce1c63c9c92ecc
SHA512bcdbd05d70230e20fc64dd6d4bf9fab4251f768a012302cecceaf7892432141ac97bf5fe9b91ade8fcd96771f4fc16b5bb4ecfd41e575e85e9aa78a1fa35a278
-
Filesize
2.2MB
MD54577f478720501f645f1b25ea2f9b3bc
SHA1adfe232f20655b93c7fddd3b8862faf8c5baa51e
SHA256b7992a85b4fbcc78a58e8bd26e360649de666a621ff10ae48c15f28fd42a315c
SHA51262f6e6487ee6058737786da2349165375950da764ce1e95d3fec6dc1e3125bb028f76b95bdaa2c27f1e1f7532e0325b1e58ccc3af9859896142432becaff57dc
-
Filesize
2.1MB
MD5c509c02e7d908c6ceb734f4a5eba82e1
SHA199a24bcc0aafaaf3d25587c51a5e1f566797918a
SHA2567b10aaf4ac7a839c7dbf355527bdcd892a071386477c151f6d2b154b5b3e9da5
SHA51263b5bfb87991e233e4c8d17730885cb9dc04231e8adf22bbb4e1db5ac591cf1605183525e70503cdca100e7050c90e9144e25003860b633f9a394bc014e0ce80