Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 11:01

General

  • Target

    60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe

  • Size

    10.0MB

  • MD5

    694e96a74fd5ef6ead4abb5d40acd3a5

  • SHA1

    4de95af219037b7badf512427f8477edd646344b

  • SHA256

    60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e

  • SHA512

    2ce1e8f6e8549e3bda4c575fe0394c6bcd9bf18a97774b48d12473a9bc270d4dea180320f1ff2d9287476fbbf86ee1201611a4b187ee340673c03dee10192e03

  • SSDEEP

    196608:4eoS0NTxePePDdh0iCULKkOa8z1s6NXuAktmBlU4I4:4eoRrDjtLKkOa8ps6puAktIz

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe
    "C:\Users\Admin\AppData\Local\Temp\60b72ab78a1736a15a1cf0463ec561c1392969ff1bc5b395a624f06e312e7c8e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabA50.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    7KB

    MD5

    4080981e4bb254e6d2dd746451f22863

    SHA1

    5d16ff6d920cac2fd426e49add4fcdd57b0ba1c7

    SHA256

    ff94986319be81790ff4165fcd74cfb8ef4ddfd765c2e5040a2a3457c2c39b87

    SHA512

    90b71f4b4b9da78c00854379f8068ea1f2eb24a005ef9377a38434f319acfc03de1db06dfa0b456643ae68f4fa1f56dbae918e6112661030498c575a80a4dd17

  • C:\Users\Admin\AppData\Local\Temp\lite_installer.log

    Filesize

    2KB

    MD5

    19e047dce0c61b67cf1713372cbc2221

    SHA1

    6eece2b1d6558a0e2c2f984fef11735d1bd7db0d

    SHA256

    08378202a8ab6dc3d95e5d435d4792137b4f54b78b37b1a1510e68985212784b

    SHA512

    5400c3b87c0249bed45cda623ce8e18cc324cf7d9cee4c37bf13e552b52f2d27a110a1e897788c22d7bea6d19173be0e86867cbee1bb5c0810f23f38472e0809

  • C:\Users\Admin\AppData\Roaming\Yandex\ui

    Filesize

    38B

    MD5

    96fd9c129986ee1cc0e6df4376ecf1b0

    SHA1

    56ebd6cdb125a78b8b1ade174d5f55b4f71c7ac0

    SHA256

    da7f025b8b622e61497cbc6e7e51f8861c097ddff8ddc1b3bcc18dbfbc4ad7fb

    SHA512

    cd2ec359fec6ed1dc36be6e0ef0b151f90039e4d986fe30f259bdaa86683b36d3a222bb7b02375c009724770318e41c86d7a86e38e7d0296d529777a65353969