Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/04/2024, 20:21

General

  • Target

    8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe

  • Size

    74KB

  • MD5

    a7d7be50cf4724f4752f97644cf64fbc

  • SHA1

    aaa43524fcca8bbd24e736119e22df6cbe7e301b

  • SHA256

    8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7

  • SHA512

    31587192e2aa2219c21ad7a83afa7eae88db7b6db933e3bf97ca0c1c38b499f993289a42d2a641a00a930c3a2e624f6963bcd719d84fd05a830f7168ecf6efc7

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOQ8:RshfSWHHNvoLqNwDDGw02eQmh0HjWOQ8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe
    "C:\Users\Admin\AppData\Local\Temp\8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    84KB

    MD5

    8798df07f151eca1c7658502985770dc

    SHA1

    a475e2df64cffdae9dddb90bcdbb87415896c08d

    SHA256

    515976f330eb4954a42e6f604a3ff8792d0d3b835e2d633373befb5246428135

    SHA512

    51234946dba0781db9411773a9cdf86d489045c9dca82cdefd45bd8c1bcf06051506f9542f595dd45c325e6ed590fcd772e0d30ef0f20492d725365a0cf16b01

  • \Windows\system\rundll32.exe

    Filesize

    80KB

    MD5

    bf2ca48fc4c9199c66f399caca4c4682

    SHA1

    449b55ea0a1eaef6f8278be293962ecd5d2e91a8

    SHA256

    840d0bffb32982bb26d473339655e02ca773b2c3dff530cb66222067c2149a09

    SHA512

    da6b4c223b3d6158491f217e3059f37cee11f4720e64cd47277c16d5a03cfde6fe2784e2fbabe9c2b154d1adc40cd9c74f16501a409e2fc3057d3d75ee4608e0

  • memory/2052-20-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2256-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2256-12-0x0000000000350000-0x0000000000366000-memory.dmp

    Filesize

    88KB

  • memory/2256-17-0x0000000000350000-0x0000000000366000-memory.dmp

    Filesize

    88KB

  • memory/2256-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2256-22-0x0000000000350000-0x0000000000352000-memory.dmp

    Filesize

    8KB