Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    26/06/2024, 21:45

General

  • Target

    2024-06-26_77f398ff050e2cf08890f639e1eba521_avoslocker_magniber_metamorfo.exe

  • Size

    14.3MB

  • MD5

    77f398ff050e2cf08890f639e1eba521

  • SHA1

    1b8020b6aec0fe1a5734a103c5d06b9eccc10f8e

  • SHA256

    51ecacf18075cd8a1c891079e9a4ba5b8bcf047abbc3cae5dd44f12817fd4393

  • SHA512

    0230f2e40fbfe2559141678b613ae3a99033ff48e1d26e6d62d422010c173e6d9b15a218934c2abb77b43842952b4d5b8a698eeec71d5546dc689a62f7e1fb9a

  • SSDEEP

    393216:DtHLVy12S9tbV6PHxIWCEA34Z8m8KbO/rqN9/GXuunO:DtHLVycS9tbV6PHxIWCEK4fOK/GXE

Score
1/10

Malware Config

Signatures

  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-26_77f398ff050e2cf08890f639e1eba521_avoslocker_magniber_metamorfo.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-26_77f398ff050e2cf08890f639e1eba521_avoslocker_magniber_metamorfo.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    944f4f97ec761311b12ffe7552889cde

    SHA1

    b7a1694078ecacc68d875184dcbdddc43e7faf9b

    SHA256

    afd94585c1bd38c8658f274b522c268128b9e04db214e003d527661241e6ae9b

    SHA512

    dd0be50bac0dca8630450ce811464d60e57a02812eb5a934bc93fa60d3efd9fe9704189ad421bb6169b9b720948055f0677bf7879557f5e66138b317b50ba86a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    adb4e7d899fac9ccb65127b55859a8ce

    SHA1

    bb16f3c85df4e76b38f8a149cab6a32753323cf7

    SHA256

    50185bd77cb0690b063f2cafff37714b653391b5c4841f43f90832b17bc4b99a

    SHA512

    345d4e676eedd302ee0711e96c9e9cfc1ac96507e813218f080a1cbcb24a6ee0c1730dbd6b2e7dbcaa1e93bb224efe0ea451b19f14a8b6db6eed450ae8a32476

  • C:\Users\Admin\AppData\Local\Temp\Cab259C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar264B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b