Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2024, 03:07 UTC

General

  • Target

    77810.exe

  • Size

    94KB

  • MD5

    f93b32527bf4a3336aaf723e3843e167

  • SHA1

    1eff6bc9d4071208e5c27e3d888b841b77821504

  • SHA256

    773dba4375f27e9444e7c51755b6d070d3c18fce223e5a52d37f173563b16290

  • SHA512

    e32e08a55b188b40ee0c4de9b823a6d176323c6a99c9522869d4350eaaa5c068a99dc9d38f1c850f043ade9518f30e31f4dc25c0adf403deb74382a97e6d8c05

  • SSDEEP

    1536:WnnFGOHtnmJXRDB3EZTz71YvUAGjztobIu+Vh/QRFBAw1:WTYXRgbjCbb+D/QRFBZ

Score
10/10

Malware Config

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77810.exe
    "C:\Users\Admin\AppData\Local\Temp\77810.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\77810.exe
      "C:\Users\Admin\AppData\Local\Temp\77810.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      PID:2788
  • C:\Windows\SysWOW64\iconspack.exe
    "C:\Windows\SysWOW64\iconspack.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\SysWOW64\iconspack.exe
      "C:\Windows\SysWOW64\iconspack.exe"
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:2724

Network

    No results found
  • 144.217.246.57:80
    iconspack.exe
    152 B
    3
  • 144.217.246.57:80
    iconspack.exe
    152 B
    3
  • 142.44.244.43:443
    iconspack.exe
    152 B
    3
  • 142.44.244.43:443
    iconspack.exe
    152 B
    3
  • 193.251.43.125:7080
    iconspack.exe
    152 B
    3
  • 193.251.43.125:7080
    iconspack.exe
    152 B
    3
  • 70.119.165.108:443
    iconspack.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2088-6-0x0000000000280000-0x0000000000290000-memory.dmp

    Filesize

    64KB

  • memory/2088-5-0x00000000001E0000-0x00000000001ED000-memory.dmp

    Filesize

    52KB

  • memory/2088-4-0x0000000000270000-0x000000000027D000-memory.dmp

    Filesize

    52KB

  • memory/2088-0-0x0000000000270000-0x000000000027D000-memory.dmp

    Filesize

    52KB

  • memory/2088-14-0x00000000001E0000-0x00000000001ED000-memory.dmp

    Filesize

    52KB

  • memory/2604-19-0x00000000001F0000-0x00000000001FD000-memory.dmp

    Filesize

    52KB

  • memory/2604-29-0x00000000001E0000-0x00000000001ED000-memory.dmp

    Filesize

    52KB

  • memory/2604-21-0x0000000000280000-0x0000000000290000-memory.dmp

    Filesize

    64KB

  • memory/2604-20-0x00000000001E0000-0x00000000001ED000-memory.dmp

    Filesize

    52KB

  • memory/2604-15-0x00000000001F0000-0x00000000001FD000-memory.dmp

    Filesize

    52KB

  • memory/2724-28-0x0000000000330000-0x0000000000340000-memory.dmp

    Filesize

    64KB

  • memory/2724-26-0x0000000000320000-0x000000000032D000-memory.dmp

    Filesize

    52KB

  • memory/2724-22-0x0000000000320000-0x000000000032D000-memory.dmp

    Filesize

    52KB

  • memory/2724-27-0x0000000000310000-0x000000000031D000-memory.dmp

    Filesize

    52KB

  • memory/2724-32-0x0000000000310000-0x000000000031D000-memory.dmp

    Filesize

    52KB

  • memory/2788-12-0x00000000001E0000-0x00000000001ED000-memory.dmp

    Filesize

    52KB

  • memory/2788-13-0x0000000000290000-0x00000000002A0000-memory.dmp

    Filesize

    64KB

  • memory/2788-7-0x0000000000280000-0x000000000028D000-memory.dmp

    Filesize

    52KB

  • memory/2788-11-0x0000000000280000-0x000000000028D000-memory.dmp

    Filesize

    52KB

  • memory/2788-30-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2788-31-0x00000000001E0000-0x00000000001ED000-memory.dmp

    Filesize

    52KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.