Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 02:21

General

  • Target

    563ca131a21ed75620f5e6874a180e20.exe

  • Size

    31KB

  • MD5

    563ca131a21ed75620f5e6874a180e20

  • SHA1

    9fd5685f16bbac96f671a4a9d53217aab485fd92

  • SHA256

    684d7931efcf8cbeb69602aec6806d5f4fd2ff76518be11cb9b91f41318de3a1

  • SHA512

    74733876dcce9c347f01c37d9fb1120511c7478e5a99dbe39201e672f9977fa04d67d9c216f95049da68384390a07a5ba3f4920c0bdd7a9d73fb05e6346ab5b7

  • SSDEEP

    768:PVEHJqjHyGvwFylDpulVSQJrE/2QmlCYZUTyn838d0o0:PH2nylslwHCCL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\563ca131a21ed75620f5e6874a180e20.exe
    "C:\Users\Admin\AppData\Local\Temp\563ca131a21ed75620f5e6874a180e20.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    31KB

    MD5

    cd7f33c9b3ba886c9c93a11562eb98f0

    SHA1

    cf11530a9112ab74b284e496df1c63f8f630ae5c

    SHA256

    8cd1b34b067963729c8a7a07bc3b26b7a32f19681aec8737e1c79e886b489e5c

    SHA512

    1992b4eee7f16300050c7e7f896d212a7e07bc0eb97b3575cdb9f00247e4ca8748534c12316508d354f6b7bc10efe6882399834b7f59264209427e3d9942df56

  • \Windows\system\rundll32.exe

    Filesize

    33KB

    MD5

    0e19584eaf8123c106c1dc5145d2860a

    SHA1

    9bab8173eb07de253adf14cecf852e8b71e46e2a

    SHA256

    c135408925555267d6e3668472e91da23ec747e2f48f1bf60ff46cfab8ec1d5b

    SHA512

    7bf237d47629207975b356b03dcf3631e6cc3c1be769e66d10c65a57c7ff951b0a7b7edd7a35893e32cdabdd1ebe73e642431ed2ed40ded5bc02efcd48eafd49

  • memory/2420-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2420-12-0x0000000000360000-0x0000000000375000-memory.dmp

    Filesize

    84KB

  • memory/2420-20-0x0000000000360000-0x0000000000375000-memory.dmp

    Filesize

    84KB

  • memory/2420-19-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-24-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-23-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-21-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-25-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-26-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-27-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-28-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-29-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-30-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-31-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-32-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-33-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2872-34-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB