Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 22:33

General

  • Target

    0ad918282c4ec42deec0ba3b7865a766668ca00e9ea6cde60ca01449761573b3.exe

  • Size

    78KB

  • MD5

    a18ef1557c74f5fa7a50a32f67c0e15d

  • SHA1

    c23664f9712031f0600b034f5ee9cf52bf78d797

  • SHA256

    0ad918282c4ec42deec0ba3b7865a766668ca00e9ea6cde60ca01449761573b3

  • SHA512

    ad3442e56b3777d7136ed79805fd84058d20faad32a6274d5a2255b77921f3e40004e8026c6c6f7416511b4ce416e30ded25e529a2e6799028efebc261e88faf

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOe/R:GhfxHNIreQm+HiB/R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ad918282c4ec42deec0ba3b7865a766668ca00e9ea6cde60ca01449761573b3.exe
    "C:\Users\Admin\AppData\Local\Temp\0ad918282c4ec42deec0ba3b7865a766668ca00e9ea6cde60ca01449761573b3.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    80KB

    MD5

    5055c27af01f34f95062a5377c850f2f

    SHA1

    697f1028961089edd4ec218103770f39d6a8fd8e

    SHA256

    e277557071b71820eb1dcbdd79af317f9962a765e5062f9f7c4c055a35ba0c83

    SHA512

    dd6054f623f7fa9d3fff3871aadccddc3a02e3c71e8f8675744125be19b53d7a1459c30ef28fe5e8a612ced7d876a959eafdc2144623fd93d79311c9ef862b47

  • \Windows\system\rundll32.exe

    Filesize

    77KB

    MD5

    9122a029d28f147c98d9e7d08ab6cb75

    SHA1

    a0fee9ac62a7e10415d3096f2b0c75bba1036959

    SHA256

    ed0015027eee610ebc27cc035a9d9c90c9147852ebacdd1f3f007e86a3d1ae96

    SHA512

    c6226988094b83e48db5ce3e2f38cc2fa594e610d796efd93733c86858b7390efd9ec73987073425ed1a21b098af8e49d8a4c9f169c0a593d006072d5c8ac005

  • memory/1732-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1732-18-0x0000000000360000-0x0000000000376000-memory.dmp

    Filesize

    88KB

  • memory/1732-17-0x0000000000360000-0x0000000000376000-memory.dmp

    Filesize

    88KB

  • memory/1732-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1732-22-0x0000000000360000-0x0000000000362000-memory.dmp

    Filesize

    8KB

  • memory/2332-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB