Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 09:28

General

  • Target

    8cb12865a71d87d7311228712db74940N.exe

  • Size

    2.3MB

  • MD5

    8cb12865a71d87d7311228712db74940

  • SHA1

    5015be61802f5b83ca32d637f30df892d8aca0e2

  • SHA256

    376b0d8fb80858c81d3e0536b9dc4e7be10948118f1aefe449a1f3d32eadbc9d

  • SHA512

    0ce4b7ec46da883a6485195f7d3b872a9bd3fef8593b595069868f05720c593a17060dd92ffbc7b7c0b91e362a9abd2365a280eed02090ee1e0e4053f4861e68

  • SSDEEP

    49152:ub+yLLwRrB3tRPltBW5LqLM4DtipK6FvMK7m/1OavYc+F:jwLu13B68g+tiptm9Uc+F

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cb12865a71d87d7311228712db74940N.exe
    "C:\Users\Admin\AppData\Local\Temp\8cb12865a71d87d7311228712db74940N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXF79A.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    2.3MB

    MD5

    81d086b0c0f2a4754c49d9398a325c7f

    SHA1

    31928457c5a006c21f42e0f2a92765416f49a080

    SHA256

    edb204b91840c7a0fc87a51772df37ada1558e165ebab864d4ef91d4da1a1164

    SHA512

    104863cee533dc131ce7d69e4bc56f0e1f8a458bde974e35ccb91648e87c5097c098038ac4fe076165de578338f1d50cf33dd48233c79749797bbd542c7fea08

  • memory/2372-111-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-108-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-109-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-110-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-107-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-112-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-113-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-115-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-116-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2372-117-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB