Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 04:19

General

  • Target

    1b49b943563df68409df41815e2a3377228eb6ae283e6024a5c05494b13af400.exe

  • Size

    81KB

  • MD5

    ab24cd0704fae929b2c791b6dfeaa20e

  • SHA1

    fc496346ee63807fa8bde273ab8436615c02b2ad

  • SHA256

    1b49b943563df68409df41815e2a3377228eb6ae283e6024a5c05494b13af400

  • SHA512

    74da09fef5345435dd6bfde5b9bffd64d143c4550fb15918a9007dee608d7fdbbe1ad349d495512ff1da585a374d9ccaadf63ed164d89dd27accb099a7859adf

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOP6GMJr:GhfxHNIreQm+Hik6GMJr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b49b943563df68409df41815e2a3377228eb6ae283e6024a5c05494b13af400.exe
    "C:\Users\Admin\AppData\Local\Temp\1b49b943563df68409df41815e2a3377228eb6ae283e6024a5c05494b13af400.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    79KB

    MD5

    75af066563fb403e63cb5658383ae849

    SHA1

    7e21496e2b940f4ec5011de5a573c61021164edd

    SHA256

    357fd55b61a9f5eff49108b2e7b45db9719538f7a21a3ecdb6abffc0b06fb943

    SHA512

    cea4b2d4942bc8915c3f398504f23af383844dd91d2c6eacf1b2947066192b8c267905550e4301923aef2f1cfac935a83e09ac91e79e675439da1a85e15ebb79

  • C:\Windows\system\rundll32.exe

    Filesize

    79KB

    MD5

    8d379944fd2362551d85035961c05be1

    SHA1

    594845ce05e1fcb03a8eaad76e2e92d433db8371

    SHA256

    5421f038dabe6fe1c91432140f1873a59b0a4b1f8ed7e6d60ac15b305c2e8230

    SHA512

    6282054ad073f7464e6c8650349afab5be4ea07a4a37da050e9754848767b18b460deeece24cabed0d6f974d4403e61c0ad9bd2d4b2c5af4db05bd27da8b84de

  • memory/1680-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1680-12-0x00000000002F0000-0x0000000000306000-memory.dmp

    Filesize

    88KB

  • memory/1680-19-0x00000000002F0000-0x0000000000306000-memory.dmp

    Filesize

    88KB

  • memory/1680-22-0x00000000002F0000-0x00000000002F2000-memory.dmp

    Filesize

    8KB

  • memory/1680-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2904-20-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB