Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 04:38

General

  • Target

    cvery.com/vnc_manager.exe

  • Size

    12.4MB

  • MD5

    eceac44b43df588080fda269c2433426

  • SHA1

    ca5b4f6ab0c5132da5ae12f1cbadfd89e8afb195

  • SHA256

    ae9bb9f6fcc16ee8aa9ab83d75f30e0bb63fd716779e7fd2942b2f8a79b10676

  • SHA512

    f814b3057022228f6db7dfcecb95d0ac816b2301eaa3562f874d46e3bbfc5a325d5145ddd978697caa4c4371d2342829a41093ae554cfd382b7b202101df8f76

  • SSDEEP

    393216:2sOMPLxrf4bygwTtRtBHXN1/nZVIjXpc7C:3BPLdoUzt99dbIj5c7C

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cvery.com\vnc_manager.exe
    "C:\Users\Admin\AppData\Local\Temp\cvery.com\vnc_manager.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_FD86D1AAAEAD155A62F601F343714ED5

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\Local\Temp\_is7B29\0x0409.ini

    Filesize

    5KB

    MD5

    9f58efec8728c055771284ff8ed08d1f

    SHA1

    afc5cdd023539612f9e333353b05daa7c52529be

    SHA256

    e3bbb08ad52ba0222ab56edf8d2650cf6b1cbdf7c002aba0b6274c9329257b01

    SHA512

    eda026cf7939a015513b0b18b426704927d53db08152f608fdacf6c851227b039fafa0138c88c7c8915d6614b07fcc86becf17d70ffc7d9b4ef48f5d93c11134

  • C:\Users\Admin\AppData\Local\Temp\_is7B29\Setup.INI

    Filesize

    2KB

    MD5

    f1fca97653bfbb0fcae1fc34bff01efe

    SHA1

    128524e60c60dede107cd025769fab1d86bffe8a

    SHA256

    aa07a9b4de65728c3c80e1cd7a2da4625fd0e7cfab92a7d29bd71ed5ed62dd2d

    SHA512

    58ff9df3dca2903ee23ec433e9dbb0b16501bde4f5b5b84a629af1a9521b13766b396c6a1a3df770fe516f7069a53d8a577714c3c8c9e307ade0092281ffd67d