Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 13:23

General

  • Target

    1tv.exe

  • Size

    557KB

  • MD5

    8cb6a77b770657e33efd4b09caab7b0a

  • SHA1

    47bb47a0bd0bbe9eb66ba4b4f30564b980835e52

  • SHA256

    a7aa475d631d59054a3c6ee4e348664c1044f76316b1bd6cff32696d04a81b41

  • SHA512

    52514af3abae53d6fe44608f6b1cdd36b87a6ca88323ee2c8d60e9783eb973c5552d140de66dc683014117a78582126a0a912da57ed55cb37b1b74392ce61d88

  • SSDEEP

    12288:AMAi00JcKpn053TAn8eEU56fTVlHjpE9pGyqc2GlUk+aDoenRq8:P00Jp0588eh5Oja9pGyqcVlN+0

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1tv.exe
    "C:\Users\Admin\AppData\Local\Temp\1tv.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\bcOMKqvTe[1].js

    Filesize

    33KB

    MD5

    e2ec36d427fa4a992d76c0ee5e8dfd4d

    SHA1

    47ec4ace4851c6c3a4fe23ad2c842885f6d973f2

    SHA256

    36488e81afcbc4d7018b8764c18032b10be21aa45521c9671fde0cc77f70b2d8

    SHA512

    d1ae29d19f65ce74b9b480c82b87315634ec2e96d199f5feb423918af9ad6e24c8b436e03904d452f71562f04c42acbb250256eed73bcd592a79c08911c74976

  • memory/2012-0-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/2012-36-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB