Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
9s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
ddd8c093f1159d62ec339b5f708028a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ddd8c093f1159d62ec339b5f708028a2.exe
Resource
win10v2004-20240226-en
Errors
General
-
Target
ddd8c093f1159d62ec339b5f708028a2.exe
-
Size
13.2MB
-
MD5
ddd8c093f1159d62ec339b5f708028a2
-
SHA1
deb1313768486adb85a3fd8fde62405c26b3be5e
-
SHA256
581dae7d1fbe30dc7fb6d343cb749f1445de1031e9fa1215a49b9e64cc8aa5a6
-
SHA512
0cc7e020787c2cb9d6e39e9b14c3d39fd8724366906c3afd59f0b2e16acccb7ed51dfec2ab15fbe234e62a567f2e67a8878befe911fc70e3298682fb27d6d2b2
-
SSDEEP
49152:EQFRHrmQG+yrwrTyRpL3rwrIrwrTvL3rwrtwrIrSRpL3rwrIrwrTvL3rwrtwrIrr:EcKTy/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2604 ssr.exe -
Loads dropped DLL 2 IoCs
pid Process 1612 ddd8c093f1159d62ec339b5f708028a2.exe 1612 ddd8c093f1159d62ec339b5f708028a2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 ssr.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2604 ssr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2604 ssr.exe 2604 ssr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2604 1612 ddd8c093f1159d62ec339b5f708028a2.exe 28 PID 1612 wrote to memory of 2604 1612 ddd8c093f1159d62ec339b5f708028a2.exe 28 PID 1612 wrote to memory of 2604 1612 ddd8c093f1159d62ec339b5f708028a2.exe 28 PID 1612 wrote to memory of 2604 1612 ddd8c093f1159d62ec339b5f708028a2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddd8c093f1159d62ec339b5f708028a2.exe"C:\Users\Admin\AppData\Local\Temp\ddd8c093f1159d62ec339b5f708028a2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\ssr.exeC:\Users\Admin\AppData\Local\Temp\ssr.exe -run C:\Users\Admin\AppData\Local\Temp\ddd8c093f1159d62ec339b5f708028a2.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2604
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5010f8e48936dd59be27943a1eb643571
SHA1a02ec5adc191adafd92c8407448491124b5e5bda
SHA256db099f46f38d4423f8557686fcf1d84eb5a8eb91321209f73b79cfb559ca5751
SHA512ad79b61825b68b2116858c4d0500ca38e43f61ad9e81a713248cd0a3bf241cc7a5f700872c6812a02e408c71478ac49675828fda7438ef4571bd4e0b12ef4313
-
Filesize
1.6MB
MD5191b9fe09390814f5c0adf4bc8ff832d
SHA13d7117cb9a70d1dc3a098260c8b99c56058cdd1c
SHA2560445b19d81e33f060f4ee8681d01b1645d260cc3e40ca71d234b24b2cf489c31
SHA5124d62052a830deac529d9bc7668bb8543a8ccf02991ce56d9cce9a8d2b02b2340f8da05ef8161be5698143ad7a8f8a05375f8ee816eabedd259bdbec12735425d
-
Filesize
659KB
MD53f3fb9616be5352ce97c82d30ce8e9a1
SHA12c2c00ee3c57eb13dd755a3a5e15ab9045fb3fef
SHA256f37bc73193432702ff0b55b2ee9b841e32ca193465817220eb3ff1bb18475481
SHA51245145541ccb81f043eb54d92e4518df28c46f2aeb76580b081e041da380f0b7e27fed2821032c9f155e0b7aa53abcaf9ec92e940caef3bea4556f615f19a9882
-
Filesize
630KB
MD5c5bae681aa385d72d3f89f1605a222cb
SHA10422e81b5fda74c58b8da81623e2bc93644120e9
SHA25643237b06cea6f1bcd79247466990058875d6053f8666709b442d91928f9d73fb
SHA51229484536ea02b25f5ca4c1b4dc76a29c176f72814da476d1cc26814b9202fe867ef222a486f8d7446e44ac03e4176ec55d939863607c7c3c7148178f2bbaa26d
-
Filesize
93KB
MD50308e16657dac5687d624a05f9cd0981
SHA1dcc1a84cbffecd17829597a567cfbd6387802c65
SHA25625fcfefe51daa36ca77137e517578388531befe1f1295d1648e945aa44ccef9d
SHA5128513611a7a10ff8eb6c9df617bbf4348691dfb60a090132997bef31c5d33e5651ab657e677ac81dc74018b8cb398c169f62cfb3232c158bd47064cd5d4d951dc