Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/04/2024, 03:01

General

  • Target

    3077a0cf634319e7cd4ebe8ee0416c809bffc0099b5700e19b72e882afe3bd4b.exe

  • Size

    73KB

  • MD5

    6a0793ab2ddc8c9a85e74c85acca87aa

  • SHA1

    68e3299f98b63da0c7f950e3338568391df18831

  • SHA256

    3077a0cf634319e7cd4ebe8ee0416c809bffc0099b5700e19b72e882afe3bd4b

  • SHA512

    2a4bd12560f1f0a5e5a8c614b749fdfaf259f82ea702f48bdf86e71d38f02f4381a3df81be82366fedb7c4e9ae5efd5dc84aa8e46116d66ddeb0ea27f2d64722

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO3R:RshfSWHHNvoLqNwDDGw02eQmh0HjWO3R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3077a0cf634319e7cd4ebe8ee0416c809bffc0099b5700e19b72e882afe3bd4b.exe
    "C:\Users\Admin\AppData\Local\Temp\3077a0cf634319e7cd4ebe8ee0416c809bffc0099b5700e19b72e882afe3bd4b.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    78KB

    MD5

    7c5edadd02f4cf20aa480346f5dd5822

    SHA1

    dda9064c1d2a5deadae8298a675e5e0c58407349

    SHA256

    9711dd54e5397bcee0e2449ebd89e761241f65fe775f9f37063c616c34bb4a1f

    SHA512

    96aa75f4d942e8a751af49cba2bf856c92733a199742030b14465bc699ebf36c1718271cc54c93f84a653188388ce3192c03b79bb14b26cbddf0d7e3d93f23bc

  • \Windows\system\rundll32.exe

    Filesize

    77KB

    MD5

    b9fb7b4f20f83fdd3634d7e79cea7326

    SHA1

    34194073ad342c818282f6d8fa7f86f8a3d89bdf

    SHA256

    a70709db8152d487a312231c80e22b1c4f3a0d2e6e53e8fa92403746b5c36b27

    SHA512

    fbb2ca9e662efd9033936b44b86bd2b9bf8e5cfbb6f15bf18ceedf77710344de965692d6af15afe3b0b48f5516486da2a6635470e9328bc41fb6c3db22450465

  • memory/2276-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2276-12-0x0000000000360000-0x0000000000376000-memory.dmp

    Filesize

    88KB

  • memory/2276-17-0x0000000000360000-0x0000000000376000-memory.dmp

    Filesize

    88KB

  • memory/2276-22-0x0000000000360000-0x0000000000362000-memory.dmp

    Filesize

    8KB

  • memory/2276-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2984-20-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB