Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 11:09

General

  • Target

    2024-06-24_53c33b4cfb660d445ac22ccb3e552daa_magniber_metamorfo.exe

  • Size

    13.0MB

  • MD5

    53c33b4cfb660d445ac22ccb3e552daa

  • SHA1

    69e70fc323b3425aa558905022a2c57f947c5b63

  • SHA256

    bcbac43b90b8b15258dd9f665301c8f04f29176c75d9eb5b39b9cdd713c22683

  • SHA512

    ce88b9918102396296870e2e74021b34c93de55d37ab693255872dea4066af7fa5544c6262ff3b1c1c6c0ac0e3eb9451a4edb914d288e6fd622a5599504bb48a

  • SSDEEP

    196608:VnC20D8MFxKhdj9O0AoHWrXoLGI+zNLdmODAH06tWnJ1ebrqNV2R7+jl:VnA8ywhdRvbWr49hFH06ttbrqNo+B

Score
1/10

Malware Config

Signatures

  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-24_53c33b4cfb660d445ac22ccb3e552daa_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-24_53c33b4cfb660d445ac22ccb3e552daa_magniber_metamorfo.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5d2068bb173848537723c87e4fc01b0

    SHA1

    1bbffd6b2ab73265a3edeff272849fe3970c3fd1

    SHA256

    f3689ee0f812dfe906d5230fb581da274905bc9b5d97f5a28e95609b8c66ef13

    SHA512

    798763be7ec66fa9cc64dc65efeb4ddfb63ccc81051a623eca4401cc63ea943e0a5a75bc466bd009d177a8587b3a5972d1c15b52fcd813cf6c674abe0583f0ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b39c6446d4e7d5f1f174b4369cd579b

    SHA1

    bdd14c84fb16f98869ab0321c9a07ae24d5b9c33

    SHA256

    159e76b91ef9a4ca9a98734ffad97a5192be5c3c366adb54afda6856accd68fd

    SHA512

    f28ba630f6997407ef745f5acb7b133be954b2ff352b21038debbfa8c4f9684a9b818c1dc672617587bf2ceca84f51b968a7c648b933e730e9c8cf184a7b3cb3

  • C:\Users\Admin\AppData\Local\Temp\Cab1D72.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1E11.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b