Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 04:12

General

  • Target

    66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe

  • Size

    375KB

  • MD5

    8378b2f4882a9b61e019940785026797

  • SHA1

    c2f3f68f5749fd1a82de626e2f07d15ba73ba200

  • SHA256

    66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff

  • SHA512

    c91903880e4b48f30060a3eccad8db7b53c8751750d4929c0829183c3b35fbe20e8dd0536fae9d141429d37f17067d56387f40ea55e4db3f2c4e3f808c9fa1a3

  • SSDEEP

    6144:8Uvbxx27D7qzfe0gz/+PDQ6sNkJjBbTLbF58CVT2w:p+7n0feL/+Po29BbnbF5d9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe
    "C:\Users\Admin\AppData\Local\Temp\66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe
      "C:\Users\Admin\AppData\Local\Temp\66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe
        "C:\ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe
          "C:\ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe"
          4⤵
          • Executes dropped EXE
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1336
          • C:\Program Files (x86)\Windows Media Player\WMPDMC.exe
            "C:\Program Files (x86)\Windows Media Player\WMPDMC.exe" /i:1336
            5⤵
              PID:1156

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe

      Filesize

      375KB

      MD5

      302b550f6b440569a514941583db4713

      SHA1

      65ec6e2f835592015a9e1c641aa8a02d4009b75e

      SHA256

      bef7c06bb40cd9cedaf3dc930462b2d89ade594901a5d98b91fb53f799c22140

      SHA512

      339e92a5e52d1fe95b66d8905480f52dba8de255576236952f5bf3e80674364afdbf273fe2d011c7afab63b57aba956f8a6f672094d7aed766a121981901d87d

    • C:\ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe

      Filesize

      375KB

      MD5

      302b550f6b440569a514941583db4713

      SHA1

      65ec6e2f835592015a9e1c641aa8a02d4009b75e

      SHA256

      bef7c06bb40cd9cedaf3dc930462b2d89ade594901a5d98b91fb53f799c22140

      SHA512

      339e92a5e52d1fe95b66d8905480f52dba8de255576236952f5bf3e80674364afdbf273fe2d011c7afab63b57aba956f8a6f672094d7aed766a121981901d87d

    • C:\ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe

      Filesize

      375KB

      MD5

      302b550f6b440569a514941583db4713

      SHA1

      65ec6e2f835592015a9e1c641aa8a02d4009b75e

      SHA256

      bef7c06bb40cd9cedaf3dc930462b2d89ade594901a5d98b91fb53f799c22140

      SHA512

      339e92a5e52d1fe95b66d8905480f52dba8de255576236952f5bf3e80674364afdbf273fe2d011c7afab63b57aba956f8a6f672094d7aed766a121981901d87d

    • \ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe

      Filesize

      375KB

      MD5

      302b550f6b440569a514941583db4713

      SHA1

      65ec6e2f835592015a9e1c641aa8a02d4009b75e

      SHA256

      bef7c06bb40cd9cedaf3dc930462b2d89ade594901a5d98b91fb53f799c22140

      SHA512

      339e92a5e52d1fe95b66d8905480f52dba8de255576236952f5bf3e80674364afdbf273fe2d011c7afab63b57aba956f8a6f672094d7aed766a121981901d87d

    • \ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe

      Filesize

      375KB

      MD5

      302b550f6b440569a514941583db4713

      SHA1

      65ec6e2f835592015a9e1c641aa8a02d4009b75e

      SHA256

      bef7c06bb40cd9cedaf3dc930462b2d89ade594901a5d98b91fb53f799c22140

      SHA512

      339e92a5e52d1fe95b66d8905480f52dba8de255576236952f5bf3e80674364afdbf273fe2d011c7afab63b57aba956f8a6f672094d7aed766a121981901d87d

    • \ProgramData\ADqWYzDdIG0zm3Lj\dtTKd4MG.exe

      Filesize

      375KB

      MD5

      8378b2f4882a9b61e019940785026797

      SHA1

      c2f3f68f5749fd1a82de626e2f07d15ba73ba200

      SHA256

      66674b58fcd2f2ba45bc0ce7ede7d78c0f811808ba7c837c882a2b9e487edaff

      SHA512

      c91903880e4b48f30060a3eccad8db7b53c8751750d4929c0829183c3b35fbe20e8dd0536fae9d141429d37f17067d56387f40ea55e4db3f2c4e3f808c9fa1a3

    • \Users\Admin\AppData\Local\Temp\7mtykblF.exe

      Filesize

      375KB

      MD5

      302b550f6b440569a514941583db4713

      SHA1

      65ec6e2f835592015a9e1c641aa8a02d4009b75e

      SHA256

      bef7c06bb40cd9cedaf3dc930462b2d89ade594901a5d98b91fb53f799c22140

      SHA512

      339e92a5e52d1fe95b66d8905480f52dba8de255576236952f5bf3e80674364afdbf273fe2d011c7afab63b57aba956f8a6f672094d7aed766a121981901d87d

    • memory/1076-59-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1076-65-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1076-54-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1076-58-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1076-56-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1156-83-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1336-75-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1336-82-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB