Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    167s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 18:51

General

  • Target

    00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe

  • Size

    175KB

  • MD5

    a36af6f6c153f389108c6f75fba0a000

  • SHA1

    ff94af7ab590026001971625b94ec5a12ce16034

  • SHA256

    00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7

  • SHA512

    0af6a54b8821dcac71443d266f0f2c191e35f43827e0381dcd5eede698bb235f101f0fbafc601a2b056eb145e7d09cec6aeca2156f80e04d1cbebd5b300bf4bc

  • SSDEEP

    3072:wQVG4urzuVGp8rojCJ37y1KqPL1/7w6ZZ+Jb29iCsD:woezrKMUyL+J5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe
    "C:\Users\Admin\AppData\Local\Temp\00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:944
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev76F5.tmp!C:\Users\Admin\AppData\Local\Temp\00875b5a08144e28b8fae64a425f7f598fd5c276dec726da780afc2e1aa3e3a7.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev76F5.tmp!C:\Users\Admin\AppData\Local\Temp\00875B5A08144E28B8FAE64A425F7F598FD5C276DEC726DA780AFC2E1AA3E3A7.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\00875B5A08144E28B8FAE64A425F7F598FD5C276DEC726DA780AFC2E1AA3E3A7.EXE

    Filesize

    175KB

    MD5

    705556461527afa95caa9a875cef9d14

    SHA1

    7952dc1c66c057f1b0c4576ce29e7de48d4effe6

    SHA256

    de070ecbb9ddec788ed7537ba61ee064eb0d302f33821ca2c501751c3e4152d2

    SHA512

    4126696fc6d22847acd39fb345680e52cd9ce0c8074fbf4f3ee79d2da46cb9dd4d25b541f58d3d9cc72b7d6fac15ba9586e93d7c5548b5636e5b9dab023d4c5d

  • C:\Users\Admin\AppData\Local\Temp\00875B5A08144E28B8FAE64A425F7F598FD5C276DEC726DA780AFC2E1AA3E3A7.EXE

    Filesize

    175KB

    MD5

    705556461527afa95caa9a875cef9d14

    SHA1

    7952dc1c66c057f1b0c4576ce29e7de48d4effe6

    SHA256

    de070ecbb9ddec788ed7537ba61ee064eb0d302f33821ca2c501751c3e4152d2

    SHA512

    4126696fc6d22847acd39fb345680e52cd9ce0c8074fbf4f3ee79d2da46cb9dd4d25b541f58d3d9cc72b7d6fac15ba9586e93d7c5548b5636e5b9dab023d4c5d

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    128KB

    MD5

    2865f575487ebb3cd3a0feeb69c8c5c1

    SHA1

    3f4545160bb698cf33b3f497555ca7cafcd3be55

    SHA256

    faeb4c15832b84805829da3d627a68523224ba5007ceac6b1ebcac9660bb3c6b

    SHA512

    e23c2eb00413f056e934284f8dae5e3a33f3514d586c0070380656ee676a9ff9160a55aed2bd75b1a5f79e577cc7def2a0aedea5c3db0f1f0a13ce84ce651dd6

  • C:\Windows\MSWDM.EXE

    Filesize

    128KB

    MD5

    2865f575487ebb3cd3a0feeb69c8c5c1

    SHA1

    3f4545160bb698cf33b3f497555ca7cafcd3be55

    SHA256

    faeb4c15832b84805829da3d627a68523224ba5007ceac6b1ebcac9660bb3c6b

    SHA512

    e23c2eb00413f056e934284f8dae5e3a33f3514d586c0070380656ee676a9ff9160a55aed2bd75b1a5f79e577cc7def2a0aedea5c3db0f1f0a13ce84ce651dd6

  • C:\Windows\MSWDM.EXE

    Filesize

    128KB

    MD5

    2865f575487ebb3cd3a0feeb69c8c5c1

    SHA1

    3f4545160bb698cf33b3f497555ca7cafcd3be55

    SHA256

    faeb4c15832b84805829da3d627a68523224ba5007ceac6b1ebcac9660bb3c6b

    SHA512

    e23c2eb00413f056e934284f8dae5e3a33f3514d586c0070380656ee676a9ff9160a55aed2bd75b1a5f79e577cc7def2a0aedea5c3db0f1f0a13ce84ce651dd6

  • C:\Windows\MSWDM.EXE

    Filesize

    128KB

    MD5

    2865f575487ebb3cd3a0feeb69c8c5c1

    SHA1

    3f4545160bb698cf33b3f497555ca7cafcd3be55

    SHA256

    faeb4c15832b84805829da3d627a68523224ba5007ceac6b1ebcac9660bb3c6b

    SHA512

    e23c2eb00413f056e934284f8dae5e3a33f3514d586c0070380656ee676a9ff9160a55aed2bd75b1a5f79e577cc7def2a0aedea5c3db0f1f0a13ce84ce651dd6

  • C:\Windows\dev76F5.tmp

    Filesize

    47KB

    MD5

    51e1c3c29b536bf2f238dc899f807f49

    SHA1

    d42bbd9ff653e6c57bdecd5e572cee94cbc5d8c6

    SHA256

    cdad66faf00bdb8a68425d537c12ceae853ad38dc50ae15cf70080fb34511a8a

    SHA512

    a011acaf08b7fa7bcf6551d0bebad6ab5fe27af96243f0cbc5836e09b49275a63ed39fdd02301d5cd1af7e8e7fd686f11d91ee80bc49b3e5f1d8c36d908974ad

  • memory/944-68-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/944-67-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1360-64-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1732-66-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1900-58-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB