Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 06:54

General

  • Target

    87efac17cb69a28e28eb15540f20ee9c9e1ad56d3f98b983689e5d1f45ca9754.exe

  • Size

    75KB

  • MD5

    eca4fc0f904e6323955bc57dd68ae58f

  • SHA1

    89359b5b5f9103f255fa44e1bba9c2009e3e8d0f

  • SHA256

    87efac17cb69a28e28eb15540f20ee9c9e1ad56d3f98b983689e5d1f45ca9754

  • SHA512

    15bbeb1af9c9f9550e18fba6470e4d28094f0a60a2fda7e555a59bd408fb23bf0511eb94c7d04bab503d08dc99337127662354ed47a2ea209e1ce244259e2137

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOEd:RshfSWHHNvoLqNwDDGw02eQmh0HjWOEd

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87efac17cb69a28e28eb15540f20ee9c9e1ad56d3f98b983689e5d1f45ca9754.exe
    "C:\Users\Admin\AppData\Local\Temp\87efac17cb69a28e28eb15540f20ee9c9e1ad56d3f98b983689e5d1f45ca9754.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    77KB

    MD5

    7ae37b272cc024db0120934c31f80f28

    SHA1

    91a24ae9387294c5f6c52431ed9906aa6fe03640

    SHA256

    58ebee5ff35aadb3e08e94d474edf83a2939f18e25e95d490875948335ddebee

    SHA512

    5ed7e9dc604a6cf34694528acbfd735e0686826b743d39eb3fb4efdb299947e346aec16b1e939187a4064a41e505700261bce48f094485da36944144a1e9ab1c

  • \Windows\system\rundll32.exe

    Filesize

    80KB

    MD5

    a5cd8fc525b13f71b9051df0df4c81bc

    SHA1

    b03143816c1bce1584a7b010049ccaf1bb61b539

    SHA256

    1796369efda4442ef49a2806580302388e3013e0f118741ef545dd7a32ec7ce0

    SHA512

    4d565650babf1c64299fa8d917e1c0e4cdd15820fde47891f5a8e027f260b6e731fbad0d3636e5bb239a0df2b6669b453c044857b9967311e47b7c2efefb038b

  • memory/2316-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2316-12-0x0000000000240000-0x0000000000256000-memory.dmp

    Filesize

    88KB

  • memory/2316-18-0x0000000000240000-0x0000000000256000-memory.dmp

    Filesize

    88KB

  • memory/2316-22-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2316-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2696-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB