Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    17s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 15:31 UTC

General

  • Target

    1d2dcc5ecd7d6164b848884b8cc8572a531afdc1eab94fec7725676996386f17.exe

  • Size

    935KB

  • MD5

    08be0b77b5cf559448fbfff805590f5e

  • SHA1

    40717257a135800d852322288002fbe42dfd0d7f

  • SHA256

    1d2dcc5ecd7d6164b848884b8cc8572a531afdc1eab94fec7725676996386f17

  • SHA512

    8ea6b70316141bf825964a9fc13a97d83de0bbbc17babf4adc9a8b6abd495cc505628c1bc59c832399cf107c1a68fd374c0f96cf1416b518f1a5a7c3a460defb

  • SSDEEP

    12288:p5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4+W:pyHv5Z+Wzv7AiBll0OBWi6si9GdW

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d2dcc5ecd7d6164b848884b8cc8572a531afdc1eab94fec7725676996386f17.exe
    "C:\Users\Admin\AppData\Local\Temp\1d2dcc5ecd7d6164b848884b8cc8572a531afdc1eab94fec7725676996386f17.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\1d2dcc5ecd7d6164b848884b8cc8572a531afdc1eab94fec7725676996386f17.exe
      "C:\Users\Admin\AppData\Local\Temp\1d2dcc5ecd7d6164b848884b8cc8572a531afdc1eab94fec7725676996386f17.exe" Track="0001101000"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:776

Network

  • flag-unknown
    DNS
    fgehq2xbij60f.9fpgwzz5.com
    1d2dcc5ecd7d6164b848884b8cc8572a531afdc1eab94fec7725676996386f17.exe
    Remote address:
    8.8.8.8:53
    Request
    fgehq2xbij60f.9fpgwzz5.com
    IN A
    Response
No results found
  • 8.8.8.8:53
    fgehq2xbij60f.9fpgwzz5.com
    dns
    1d2dcc5ecd7d6164b848884b8cc8572a531afdc1eab94fec7725676996386f17.exe
    72 B
    145 B
    1
    1

    DNS Request

    fgehq2xbij60f.9fpgwzz5.com

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/776-54-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/776-55-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/776-57-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/776-58-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/776-61-0x00000000760B1000-0x00000000760B3000-memory.dmp

    Filesize

    8KB

  • memory/776-62-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/776-63-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

  • memory/776-64-0x0000000000400000-0x00000000004F2000-memory.dmp

    Filesize

    968KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.