Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    97s
  • max time network
    101s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2024, 17:51 UTC

General

  • Target

    ff95dab004cf42ec1a6864afa6220bf946d6807741455f567e3af747f5502e6eN.exe

  • Size

    219KB

  • MD5

    06b92478cb19fde2665038cbdd0b1420

  • SHA1

    1e025bd647fb544e140b5d1922f9967166e76ecb

  • SHA256

    ff95dab004cf42ec1a6864afa6220bf946d6807741455f567e3af747f5502e6e

  • SHA512

    95e342a0a79985dfe2557837ecce6b9b9523233c4a1335295fbe78e7bf8645990d763686c381a627dcf3e62acdc846cb48c4514cef304e4693216a8539251974

  • SSDEEP

    3072:3RlzaDXLsnDvTuPuoD2UKaxwExELFuWpWN71AC4WSttt1ka3OuRXdHQIZ:3XzC43GdPHj447raLL

Malware Config

Signatures

  • Detect Emotet payload 5 IoCs
  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\ff95dab004cf42ec1a6864afa6220bf946d6807741455f567e3af747f5502e6eN.exe
        "C:\Users\Admin\AppData\Local\Temp\ff95dab004cf42ec1a6864afa6220bf946d6807741455f567e3af747f5502e6eN.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Users\Admin\AppData\Local\Temp\ff95dab004cf42ec1a6864afa6220bf946d6807741455f567e3af747f5502e6eN.exe
          "C:\Users\Admin\AppData\Local\Temp\ff95dab004cf42ec1a6864afa6220bf946d6807741455f567e3af747f5502e6eN.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1612

    Network

      No results found
    • 76.74.252.88:8080
      Explorer.EXE
      104 B
      2
    • 106.187.49.59:8080
      Explorer.EXE
      152 B
      3
    • 198.57.165.84:8080
      Explorer.EXE
      152 B
      3
    • 46.32.233.226:8080
      Explorer.EXE
      104 B
      2
    • 91.121.222.31:8080
      Explorer.EXE
      152 B
      3
    • 128.199.83.40:8080
      Explorer.EXE
      152 B
      120 B
      3
      3
    • 128.199.83.40:8080
      Explorer.EXE
      152 B
      120 B
      3
      3
    • 203.143.85.58:8080
      Explorer.EXE
      152 B
      3
    • 37.59.0.141:8080
      Explorer.EXE
      152 B
      3
    • 112.124.3.15:443
      Explorer.EXE
      152 B
      3
    • 99.249.191.195:8080
      Explorer.EXE
      152 B
      3
    No results found

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1180-8-0x0000000077B81000-0x0000000077B82000-memory.dmp

      Filesize

      4KB

    • memory/1180-9-0x0000000073B30000-0x0000000073B43000-memory.dmp

      Filesize

      76KB

    • memory/1180-13-0x0000000077B81000-0x0000000077B82000-memory.dmp

      Filesize

      4KB

    • memory/1180-14-0x0000000073B30000-0x0000000073B43000-memory.dmp

      Filesize

      76KB

    • memory/1612-2-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1612-4-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1612-5-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1612-3-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1612-7-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.