Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    40s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 22:32

General

  • Target

    1c6ec5dc5471383c71d7b11acc7fd7deff7b3699f6ce2111f98948135aef8d53.exe

  • Size

    334KB

  • MD5

    0146d7099ac59d5a68e0a34c172999a0

  • SHA1

    edcc76e3b453d7bca4d59f08910819ae3f64a396

  • SHA256

    1c6ec5dc5471383c71d7b11acc7fd7deff7b3699f6ce2111f98948135aef8d53

  • SHA512

    b913bdef33777544117c6f9be0d98f19754754b33cc33fd3cca6c8f9db8d8a905233bcaf417ec945d1de2db2ff977c1a0a3a8b308795b46b59d700ef260f7d31

  • SSDEEP

    6144:Urv3cdbUzkuvcBYC47l2xg/VRcYwHDhatBNgLwdx95n8VkkVG:Urv3cekuveY3VR5wjhan+L6nP

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c6ec5dc5471383c71d7b11acc7fd7deff7b3699f6ce2111f98948135aef8d53.exe
    "C:\Users\Admin\AppData\Local\Temp\1c6ec5dc5471383c71d7b11acc7fd7deff7b3699f6ce2111f98948135aef8d53.exe"
    1⤵
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\_tin5331.bat"
      2⤵
        PID:1556

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\InstallMate\D389263F\cfg\1.ini

      Filesize

      368B

      MD5

      3a9830a2f57ef1e602de02bd9cc8eb56

      SHA1

      5135a0295755e536b833c6c6010900ff99cdbabf

      SHA256

      8d138bedf3228f7ef9405940526a73f49395fd2917aa22e7d5596297e222da42

      SHA512

      87ed85acdc1509bb02e437f50e7a90695f66b2a7a996a526f0310ba277de9ce8d7343983e2ae0b5dbedcca832bb90da802d7182972f1b14be0a203cfbd14cc41

    • C:\Users\Admin\AppData\Local\Temp\_tin5331.bat

      Filesize

      50B

      MD5

      cc558a763b44c67af4ccebc4c5e2e46e

      SHA1

      25b3ba92cdaf76f4af7586569e26df0312fb3bee

      SHA256

      aa33b53454a17f1a449edac0df6a91f351149aa4ac7e78a433d817cd9edf3209

      SHA512

      68d47fed98c485537252ccf6afdd77b20a4fc3a1af80c55c72fce0028bf2570c69f109dcc5e75473d67794e737db9598f3eed555330d026282d26aa0aaaecce0

    • \Users\Admin\AppData\Local\Temp\Tsu3CDCB5E4.dll

      Filesize

      269KB

      MD5

      af7ce801c8471c5cd19b366333c153c4

      SHA1

      4267749d020a362edbd25434ad65f98b073581f1

      SHA256

      cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e

      SHA512

      88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

    • \Users\Admin\AppData\Local\Temp\{36EA6958-08F0-414F-A3A4-40D2ED094BAE}\Custom.dll

      Filesize

      91KB

      MD5

      7d9e0bfbf23ad152a2ca7509c40e3123

      SHA1

      55174b056a3643767712caf0cf5055110edbb90c

      SHA256

      ce21cf2cf68645d7fa1a0114622fd0e9122c4bafb5b0b2d4770e0570c4134c15

      SHA512

      844992ce1fafb3db4c2dba7412b657e67c3251f677bf21f77bbb3ad104da8a03c20bd530d326b3e7eed37f72af9211cd32881b3b211adb24b90bc898c8e45cb5

    • \Users\Admin\AppData\Local\Temp\{36EA6958-08F0-414F-A3A4-40D2ED094BAE}\_Setup.dll

      Filesize

      183KB

      MD5

      0423b358302bf9e8c2f7c689204e5891

      SHA1

      97688b7efdbdc08e96f49a9cb0641371862564c5

      SHA256

      ed14c4c0feac06fe1a78edb74878073e3369f80f0951c9cede2a2ff8868871e1

      SHA512

      a7717879f60adef1f7221088e37125604da4ef26dcf5f9ca17a217e51c8b6d78c7a6278bc7373c1a654e93fed5363e998df0a2ae712f29f4d53fae362622aa32

    • memory/1832-55-0x00000000763F1000-0x00000000763F3000-memory.dmp

      Filesize

      8KB