Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 08:53

General

  • Target

    aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe

  • Size

    1.2MB

  • MD5

    77f8da00f3632972d585ff7efb0bea8c

  • SHA1

    987ce549f5b8bb619bd78e5f88ae3cd132bb8f34

  • SHA256

    aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9

  • SHA512

    5b18f05dcb866aad05c25f792f3646c75444a3daf7abb52b2b5331c2a6764c9affea90735d0061d615f0a2c55226262d08b59c98c3c7cbe44528c621fd1fac16

  • SSDEEP

    24576:fqDEvCTbMWu7rQYlBQcBiT6rprG8aEnfOYbNoY5cap:fTvC/MTQYxsWR7aEfOYbNs

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe
      "C:\Users\Admin\AppData\Local\Temp\aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\aab17e4d4fcb75ffc655247c8f71df23d653b9b573d87eb2e32c589c543918f9.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2928
    • C:\Windows\SysWOW64\clip.exe
      "C:\Windows\SysWOW64\clip.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\undiscernibly

    Filesize

    264KB

    MD5

    81d057b1ac360dd8069e3f2bd4733088

    SHA1

    0fa44cb9a89c387909409c7f4c4e1fe16522b572

    SHA256

    83bf3620fbe8c97f5df54a87fad458c0cac9cf30162e7e4e474398fb980ca667

    SHA512

    17f04d2c81713ff251469fb383988b34c5bf2538d686a7ff2809bf950a608752fc4205d60daad552935eee87ceb40a7e71b92fa93eba351515a136eacefe6414

  • memory/528-21-0x0000000000080000-0x00000000000BF000-memory.dmp

    Filesize

    252KB

  • memory/528-28-0x0000000000540000-0x00000000005DE000-memory.dmp

    Filesize

    632KB

  • memory/528-27-0x0000000000080000-0x00000000000BF000-memory.dmp

    Filesize

    252KB

  • memory/528-26-0x0000000000540000-0x00000000005DE000-memory.dmp

    Filesize

    632KB

  • memory/528-25-0x0000000000080000-0x00000000000BF000-memory.dmp

    Filesize

    252KB

  • memory/528-24-0x0000000001F90000-0x0000000002293000-memory.dmp

    Filesize

    3.0MB

  • memory/528-20-0x0000000000080000-0x00000000000BF000-memory.dmp

    Filesize

    252KB

  • memory/1232-18-0x0000000000010000-0x0000000000020000-memory.dmp

    Filesize

    64KB

  • memory/2756-12-0x00000000000B0000-0x00000000000B4000-memory.dmp

    Filesize

    16KB

  • memory/2928-17-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2928-23-0x0000000000280000-0x000000000029F000-memory.dmp

    Filesize

    124KB

  • memory/2928-22-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2928-19-0x0000000000280000-0x000000000029F000-memory.dmp

    Filesize

    124KB

  • memory/2928-16-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2928-15-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2928-14-0x00000000008D0000-0x0000000000BD3000-memory.dmp

    Filesize

    3.0MB

  • memory/2928-13-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB