Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    46s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 12:19

General

  • Target

    8bfeb93c62f2be6d32e2f1b2dcc84f7eafca7066703d5f91fae10415953c97d5.exe

  • Size

    116KB

  • MD5

    a0126c733060ad47f2d32b0f76e6ae16

  • SHA1

    233987ceb51c2821065ef5685e166d822722170c

  • SHA256

    8bfeb93c62f2be6d32e2f1b2dcc84f7eafca7066703d5f91fae10415953c97d5

  • SHA512

    4dfbbb15fbc9b1fcf07937a3aa00802ec2b5981d6eeb0d1e34a56d0680bd3c00535816289bd07a9e2110e18a086aa6f13e6afa8e79e9dc7407034b4c53ad5f5b

  • SSDEEP

    1536:QMASiLNFZdO/CLX7SNOJRUo/RhGZr83hYbIg/g1kFeTbigPYv2lps8h+qc4cW7+U:Q3vO/CL2GPr3hYbIg/IEeSEYv2nhu43

Malware Config

Signatures

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 14 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bfeb93c62f2be6d32e2f1b2dcc84f7eafca7066703d5f91fae10415953c97d5.exe
    "C:\Users\Admin\AppData\Local\Temp\8bfeb93c62f2be6d32e2f1b2dcc84f7eafca7066703d5f91fae10415953c97d5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\0df64093.exe
      C:\0df64093.exe
      2⤵
      • Executes dropped EXE
      • Sets DLL path for service in the registry
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\0df64093.exe

    Filesize

    80KB

    MD5

    c87db531d270dd1c1a3fd2498bb6297c

    SHA1

    59e7d89efa5aa7ad5599ef663d9eab5d88f8d654

    SHA256

    4abb11da63415952dde29049990211e6aa0997cff3714fe0d1627140e4dcfb6a

    SHA512

    1cb3deb8e6116ccc2bf554ac8985de8fb59ad59dcbbb225d3e0f1b1767c21c3c955d1ed7f7e4c7ad8addf760c0351fef98832fa4599c5cbe3a0faf66d9213e36

  • C:\0df64093.exe

    Filesize

    80KB

    MD5

    c87db531d270dd1c1a3fd2498bb6297c

    SHA1

    59e7d89efa5aa7ad5599ef663d9eab5d88f8d654

    SHA256

    4abb11da63415952dde29049990211e6aa0997cff3714fe0d1627140e4dcfb6a

    SHA512

    1cb3deb8e6116ccc2bf554ac8985de8fb59ad59dcbbb225d3e0f1b1767c21c3c955d1ed7f7e4c7ad8addf760c0351fef98832fa4599c5cbe3a0faf66d9213e36

  • \Windows\SysWOW64\318304BC.tmp

    Filesize

    80KB

    MD5

    16439c49df10a13c9127ff79ec0017c7

    SHA1

    219058771f8b1125e5c8209e1333bdc6aa19761b

    SHA256

    d0abb63441c7ffdb94ecdff00488154ab8430c066e2d43a537e44baa48da5361

    SHA512

    dc78606a86cc5fd0e097f9b6c6e811ef7f54278e4f42fba47bc159d221e7aa134ab49455f8d9e3bbcbdf649df4a94e3e9b1232abd668ea2d953763a57679ad2e

  • memory/1148-67-0x0000000002500000-0x0000000006500000-memory.dmp

    Filesize

    64.0MB

  • memory/1148-59-0x00000000010D0000-0x00000000010F4000-memory.dmp

    Filesize

    144KB

  • memory/1148-66-0x00000000010D0000-0x00000000010F4000-memory.dmp

    Filesize

    144KB

  • memory/1148-68-0x0000000075AF0000-0x0000000075B50000-memory.dmp

    Filesize

    384KB

  • memory/1148-69-0x00000000000F0000-0x00000000000FD000-memory.dmp

    Filesize

    52KB

  • memory/1148-70-0x0000000075AF0000-0x0000000075B50000-memory.dmp

    Filesize

    384KB

  • memory/1308-61-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1308-62-0x0000000000020000-0x000000000003D000-memory.dmp

    Filesize

    116KB

  • memory/1308-63-0x0000000000020000-0x000000000003D000-memory.dmp

    Filesize

    116KB

  • memory/1308-64-0x0000000000020000-0x000000000003D000-memory.dmp

    Filesize

    116KB

  • memory/1308-65-0x0000000000300000-0x0000000000324000-memory.dmp

    Filesize

    144KB

  • memory/1308-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

    Filesize

    8KB