Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 08:06

General

  • Target

    Skrinshoter.exe

  • Size

    4.3MB

  • MD5

    f5056d53e93aae3be0d07e50d65c2558

  • SHA1

    4d2932203e2babe54b677032905fee1f527db72c

  • SHA256

    04afcfa5c05b5b21b2a5d014035ae12e5b7af4e20fb0f2e8742a9e1b4b3f9837

  • SHA512

    012db5c36418144287f49fdf8a075d3ed76f5b2509a758e41c2ad1ca3de152b646c24e1093d389eee27518aa47073515e864d3451b830cdea82ffdaec9821550

  • SSDEEP

    98304:2RYAnN1JmOzbH5z/UqqfbYlWK0/coNaVq09lHJlmd1utG0Q8vz:2C0N1BzN/3WK0xitJlmd9Uz

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Skrinshoter.exe
    "C:\Users\Admin\AppData\Local\Temp\Skrinshoter.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\curl.exe
      -L --insecure -H "X-Skr-Auth: jQCbEOsAjpVu1l31TcTR9I818qdQXvmcEHaeMulDBgK1rOiJo9kzzwpqMVsRbL8X" --connect-timeout 5 -A "Skrinshoter/3.11.4.30 ({5FC6A3BD-3B1B-4641-9859-CB3FE776A028})" "https://skrinshoter.ru/api/app/v1/user" -w"%{http_code}"
      2⤵
        PID:2760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2760-10-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB