Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 05:36

General

  • Target

    075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe

  • Size

    92KB

  • MD5

    e17c510837714971ae56bd5dd23f5570

  • SHA1

    d681e4255575a2e9a80857466730d368c8002f44

  • SHA256

    075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3

  • SHA512

    0819caa0987e320b831d1fc7973ad95bf29eb2f8879e10feb0c11604c1ae997750e2722403e4fc48b732b6432bde561391f15a46bbcb2f221ba806f052ae6d92

  • SSDEEP

    1536:1WEhM021xdKDx3DcEuNIU9/lhAHPUcgMeWp8ANkMgB1iQdbiiSKL:1WEhMTq3DcEHU3yPUpMeDANkMgXiQdbF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe
    "C:\Users\Admin\AppData\Local\Temp\075732ee66b56a7ba49a790ebf53a99bbd236572afd148953ee9a4c99a6045f3N.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\154.exe
      "C:\Users\Admin\AppData\Local\Temp\154.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2380
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\KPSS HAZIRLIK KAYNAK LİSTESİ.pdf"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\154.exe

    Filesize

    3KB

    MD5

    8a1343a147c5a257de0a5d8ca5098c2a

    SHA1

    210ffb3647434c05cbc95c12a7f8fbcf924c5fd4

    SHA256

    de4ef54cdde49c897203985f49a07d52c9909f671d66d9b861066056ef20f47b

    SHA512

    ef993a60cd15b90c04c34f7bfe852e16691975902ab8f24239a972097c33db94ff1759584d5e1af2e0a852c7bc08ebb509bfac3c9a34b5a8dda3711294078d4b

  • C:\Users\Admin\AppData\Local\Temp\KPSS HAZIRLIK KAYNAK LİSTESİ.pdf

    Filesize

    51KB

    MD5

    656ec9e216b73a5f14904bce0f814bc8

    SHA1

    6308069f9a03b64320301389f76efce9b1654b43

    SHA256

    0b594ff40f2165dac3a1d051f2917d8ab7d6dbc759b2d241af2c672d928c9aa3

    SHA512

    724ccd3c2f3be60134792605564fb4c8025bb39a2f640c6c3c8450cdf91b99d20bd22b039962c582b7a9ea8984dbad48cce2e09bf13b7155c8c3dac6ea59dad9

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    bbde3c1d6b2dfde9367070e52736d8cf

    SHA1

    c65b9cadb821c60f1f00d3ec776375382b17aed7

    SHA256

    33c2b040b486d373b543ac105ead20cae0f3be10532a8908d9681fcc6661c34e

    SHA512

    d5c89bb208fc3d9f7b9c69f869413e8804799d25d9cbf0ac1e35b0fb512ca79ae91ceddcc35b17ae66a368a1553523e0d4683d9e6f2525fd6b6a09f8697aa7e7

  • memory/2104-0-0x000007FEF5B3E000-0x000007FEF5B3F000-memory.dmp

    Filesize

    4KB

  • memory/2104-2-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2104-10-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2104-11-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2380-30-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB