Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    58s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 21:24

General

  • Target

    455daa35269fea49585007ef8cdb1204398c9da388929512ffff6e52593f0759.exe

  • Size

    18.6MB

  • MD5

    52c1c5dca79e346296b8a15a2c6f78d4

  • SHA1

    8e6d9da61cea3c1132060550da5e6240fc9b4ef7

  • SHA256

    455daa35269fea49585007ef8cdb1204398c9da388929512ffff6e52593f0759

  • SHA512

    88d834ce444ed478275a7da008a3ec4f9dc4812e1178d5b61eaa8ce0572218d1c2b529d716fc553ea607796e24924e5d66c8c9f01d89fa256ddbfab4b947c9a8

  • SSDEEP

    393216:P50orjqWRecsKLvGGakybl2NqnS+SsZN/jSnfbk7L9tVaNTkNbM+Y8upP63:RiWRJ3Mko4qnbuzk7JteTkNbMl6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\455daa35269fea49585007ef8cdb1204398c9da388929512ffff6e52593f0759.exe
    "C:\Users\Admin\AppData\Local\Temp\455daa35269fea49585007ef8cdb1204398c9da388929512ffff6e52593f0759.exe"
    1⤵
    • Loads dropped DLL
    PID:1976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsyFAB5.tmp\NSISdl.dll

    Filesize

    21KB

    MD5

    c06042c92870da38fa2a07277b819817

    SHA1

    3367186d20f996b65fd23a2a12625ceb4d6454f3

    SHA256

    039f938ca58bffdf4854162f8a134e672bdf370190062f73bfc6f90bc2e804ef

    SHA512

    ef74f9c518a323d70b9ceaa5dd0c45f0e7f8150f35c839816cf27785f57b1cfeac9debfc4abc3c9df8a783cf37ca1baab9dcce6293c6821b25cca6d2a0dff993

  • \Users\Admin\AppData\Local\Temp\nsyFAB5.tmp\System.dll

    Filesize

    67KB

    MD5

    7edd899503bafd59de23d6daf925b4fd

    SHA1

    25c965958c100b69a1f3b950f495dab89413bf27

    SHA256

    82ad8b9bdbbca94a810935163c6685dd23f32d5b350cd744a4c05f3569631025

    SHA512

    6f397be86e83235a43165ff6f7eaf82705324cc8f483619d0e4b801762e4d1c122c21f9274260818f0fe2534968004036b63bf2813f310a80cf06434696a6807

  • \Users\Admin\AppData\Local\Temp\nsyFAB5.tmp\System.dll

    Filesize

    67KB

    MD5

    7edd899503bafd59de23d6daf925b4fd

    SHA1

    25c965958c100b69a1f3b950f495dab89413bf27

    SHA256

    82ad8b9bdbbca94a810935163c6685dd23f32d5b350cd744a4c05f3569631025

    SHA512

    6f397be86e83235a43165ff6f7eaf82705324cc8f483619d0e4b801762e4d1c122c21f9274260818f0fe2534968004036b63bf2813f310a80cf06434696a6807

  • \Users\Admin\AppData\Local\Temp\nsyFAB5.tmp\dui.dll

    Filesize

    92KB

    MD5

    2c6689e9e49625b7dd61ac49bcf94562

    SHA1

    3b067922b42b1b8ff483d38bd27905e3dc1772db

    SHA256

    93f612786957bdd95a858f7c294f2d68256b6d2271c69ee96235732348b859d4

    SHA512

    f6e873bb8cbff566360f1731e83dd5dea5f4477442f8eba963f9475f98fef187d09eb998cc62df7927fa1237bc381b3321ebe55ea4bcca271a2a17eba3e9ac8a

  • memory/1976-54-0x0000000076831000-0x0000000076833000-memory.dmp

    Filesize

    8KB

  • memory/1976-58-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/1976-60-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB