Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/06/2024, 04:57

240612-flpr1a1flp 6

12/06/2024, 04:52

240612-fhvtva1eqd 6

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 04:52

General

  • Target

    PingPlotter Professional 5.24.3.8913/KEYGEN-FFF/PingPlotter.v3.30.4_KEYGEN-FFF.exe

  • Size

    471KB

  • MD5

    cb3267e801381492384e401d53880716

  • SHA1

    d313acc4478a87015da03935a4bd0cee76afa42e

  • SHA256

    6b8e8068c0c816861b00ffc82c54ecb32446c60d50d1b33fd3bce336747435d7

  • SHA512

    0b0064e76a8b02866a0ef39b9f296906aee022dcbd5f94838264d50f7ba3ef8442c90fa27d11f78f61aa5dd8c9b56072cc508c9849d6d57344efe06d2cc2aa76

  • SSDEEP

    12288:n1gnI0R3PDUFfhbXzAZqGZlxt1vGzjHIzJVmMEJ:nqR3PDUFJbjAkGDTwHcMJ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PingPlotter Professional 5.24.3.8913\KEYGEN-FFF\PingPlotter.v3.30.4_KEYGEN-FFF.exe
    "C:\Users\Admin\AppData\Local\Temp\PingPlotter Professional 5.24.3.8913\KEYGEN-FFF\PingPlotter.v3.30.4_KEYGEN-FFF.exe"
    1⤵
      PID:1312
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2860
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\MoveUndo.docm"
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1032-24-0x000000002FB31000-0x000000002FB32000-memory.dmp

      Filesize

      4KB

    • memory/1032-26-0x000000007180D000-0x0000000071818000-memory.dmp

      Filesize

      44KB

    • memory/1032-25-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1312-1-0x0000000000220000-0x000000000024E000-memory.dmp

      Filesize

      184KB

    • memory/1312-12-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1312-8-0x0000000000270000-0x0000000000272000-memory.dmp

      Filesize

      8KB

    • memory/1312-7-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/1312-6-0x0000000000220000-0x000000000024E000-memory.dmp

      Filesize

      184KB

    • memory/1312-4-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1312-2-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1312-0-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1312-11-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1312-9-0x0000000000280000-0x0000000000281000-memory.dmp

      Filesize

      4KB

    • memory/1312-13-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1312-14-0x0000000000220000-0x000000000024E000-memory.dmp

      Filesize

      184KB

    • memory/1312-15-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1312-16-0x0000000000220000-0x000000000024E000-memory.dmp

      Filesize

      184KB

    • memory/1312-17-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1312-10-0x0000000000401000-0x0000000000461000-memory.dmp

      Filesize

      384KB

    • memory/1312-5-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB

    • memory/1312-3-0x0000000000400000-0x0000000000521000-memory.dmp

      Filesize

      1.1MB