Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 14:31

General

  • Target

    fa1094b28324e4f95f957e68a7a969adcddc9ca71d93ddf725028fb7f1f1955c.exe

  • Size

    316KB

  • MD5

    a0e674357b504f305ca834f1c8379430

  • SHA1

    7bc6d07a2a8ff9ab3467e1da353091f69f4afe77

  • SHA256

    fa1094b28324e4f95f957e68a7a969adcddc9ca71d93ddf725028fb7f1f1955c

  • SHA512

    53e08e961085b3df1f91c8b8d2a6ad5cd605c0e245c4aa6f11b7f191f1b40de302e72b82dee688c9441a5417221488ce34043f6b2cd3f21b335a3058eba66d8c

  • SSDEEP

    6144:yrabUzkuvcBYC47l2xgh2hyP9wUnIG2mQP6vxoG0rkKt:yrDkuveY3N2eHnIPmQP6vqvV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa1094b28324e4f95f957e68a7a969adcddc9ca71d93ddf725028fb7f1f1955c.exe
    "C:\Users\Admin\AppData\Local\Temp\fa1094b28324e4f95f957e68a7a969adcddc9ca71d93ddf725028fb7f1f1955c.exe"
    1⤵
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\_tin218A.bat"
      2⤵
        PID:2028

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\InstallMate\F911F004\cfg\1.ini

      Filesize

      917B

      MD5

      6f6ba69bf5c8c87c105e818c6ee1bd97

      SHA1

      031870422e0accb28259a52b469927bcfc4abfa6

      SHA256

      e333f7a4914f2fd8b9bbb9b8e69fc1616fbf62dc1afb3f9268ade2c00ec35746

      SHA512

      11a9ba30a867d09c7e110fbacccfb9e6d7c5e92b20d1c0094a498044f184c1aa79009a9cc1fbace32bd27f8f568a87c1eeac77ea71f7e44c81f78ed5a42a926a

    • C:\Users\Admin\AppData\Local\Temp\_tin218A.bat

      Filesize

      50B

      MD5

      598c17e2f807a8463d30f94755edf459

      SHA1

      1534b8aa0a86efd01c9f04d80aa26235757f6c87

      SHA256

      e438bf51dd8706eb0e5e6bd3aaed9e69cec09ec4b6c34368d48a327493d56f24

      SHA512

      0fce1adb228bdcfe73b0425b2e5fc8b96869094ed976d05b6b996796df5febbba1ade0663ec31a2c05abf7533a2b931527d2f1f5682cb452bbbf56e8535ff7b8

    • \Users\Admin\AppData\Local\Temp\Tsu1176F0C7.dll

      Filesize

      269KB

      MD5

      af7ce801c8471c5cd19b366333c153c4

      SHA1

      4267749d020a362edbd25434ad65f98b073581f1

      SHA256

      cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e

      SHA512

      88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

    • \Users\Admin\AppData\Local\Temp\{A2F05F03-EF85-4DC2-AF29-A7A779137DF5}\Custom.dll

      Filesize

      91KB

      MD5

      dc1e339686c8ccab49a2860c6709760b

      SHA1

      4662d7283d4ad26b4a235d82d831db526e9daa42

      SHA256

      07d70be92b1ef086f5f41f95fe14044fe8186e85a3972bb790ae143c66214f0b

      SHA512

      913e466fcae98118375c19e000c75ef03d7f5d30f16a29ad98fd90cbed425adf6415598b332cf30652a3dab2371e4a59a6a2c813d1df739bd09080e56aed9c52

    • \Users\Admin\AppData\Local\Temp\{A2F05F03-EF85-4DC2-AF29-A7A779137DF5}\_Setup.dll

      Filesize

      173KB

      MD5

      849cfed02ed4ded563da47d93592b653

      SHA1

      bcdc289cf10557a0ee5b8a3f956739710215a4e5

      SHA256

      40f7374f5089a9429f4fe0d568364c567d535fa2d3d542d4f7dfb948c480be27

      SHA512

      8f6d24b7234efb6cbf11be13bfa11f5e6d11aea48d1c81c37a421862aa452b6af0a06bc8637b58bfae631a68aa0d532c7922ccca6433cd2e05e87198ad719cf0

    • memory/1760-55-0x0000000075931000-0x0000000075933000-memory.dmp

      Filesize

      8KB