Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 23:27

General

  • Target

    d32e408d4a112a7f5e468c6563e2f5393e970e39124a562222c3c31384c478a0.exe

  • Size

    12KB

  • MD5

    525ce41afec3272aa714e904991d49a0

  • SHA1

    be295ae605c94042db87faec291415e46d34f2a5

  • SHA256

    d32e408d4a112a7f5e468c6563e2f5393e970e39124a562222c3c31384c478a0

  • SHA512

    09cfeb3628a15f7ecb410a8a554c0885c049cee464466ca866d6c2cfb1c4975e6e4bbb6aa0294935edfe99b3f3f219f54ea3b0ae36a73ddb31680cae1f9c933f

  • SSDEEP

    96:4b6Hbg/W9mua81KzuaocoFM9er+usn5A9/T0cvpYbPbAPj:lb+W9m381muaMM9erM52b3veDAPj

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 42 IoCs
  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d32e408d4a112a7f5e468c6563e2f5393e970e39124a562222c3c31384c478a0.exe
    "C:\Users\Admin\AppData\Local\Temp\d32e408d4a112a7f5e468c6563e2f5393e970e39124a562222c3c31384c478a0.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    PID:1768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1768-54-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB

  • memory/1768-55-0x0000000000400000-0x00000000004028DB-memory.dmp

    Filesize

    10KB

  • memory/1768-56-0x0000000000400000-0x00000000004028DB-memory.dmp

    Filesize

    10KB