Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 22:25

General

  • Target

    aebbcbe584b2b8d75dc74b6388e4fb0bff0d3e38a0a496d66147c525687727d1.exe

  • Size

    100KB

  • MD5

    a176cfe3c83e5f1514feb2bc490aa490

  • SHA1

    9f239e50f3bbbada000c002dd603f65c2600daf2

  • SHA256

    aebbcbe584b2b8d75dc74b6388e4fb0bff0d3e38a0a496d66147c525687727d1

  • SHA512

    9e0bd8449562256a3042955b8eccb03490ac5cef84c95840f0587c084485183c677bb592357a56bfc883268884a3126589e0c716992f483d87ada5cfcfb3c9ee

  • SSDEEP

    1536:EaM5QIi+G5qH4u2eziPLRGpzA9RojCJ37S+QjcwuBiJR4:zaQVG4urzuVGp8rojCJ37NScJiJR4

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aebbcbe584b2b8d75dc74b6388e4fb0bff0d3e38a0a496d66147c525687727d1.exe
    "C:\Users\Admin\AppData\Local\Temp\aebbcbe584b2b8d75dc74b6388e4fb0bff0d3e38a0a496d66147c525687727d1.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1172
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev516B.tmp!C:\Users\Admin\AppData\Local\Temp\aebbcbe584b2b8d75dc74b6388e4fb0bff0d3e38a0a496d66147c525687727d1.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Local\Temp\AEBBCBE584B2B8D75DC74B6388E4FB0BFF0D3E38A0A496D66147C525687727D1.EXE
        3⤵
        • Executes dropped EXE
        PID:1408
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev516B.tmp!C:\Users\Admin\AppData\Local\Temp\AEBBCBE584B2B8D75DC74B6388E4FB0BFF0D3E38A0A496D66147C525687727D1.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\AEBBCBE584B2B8D75DC74B6388E4FB0BFF0D3E38A0A496D66147C525687727D1.EXE

    Filesize

    100KB

    MD5

    1d6c8aabf913653e54f366e3c0c82d66

    SHA1

    491e11fc6eaa44c995cbbf615b923e5e55f12b66

    SHA256

    29d97eec9a21f55f0fdf3b6acba1ff2b189af6768a885cac72c3d2d26facf982

    SHA512

    02f3f31d88494bc272b736d270cade787831fafb5cff34c52b8feaedecab3ec6ada5e8d8cbfcaa6405421103653452558a00a8d4ea456ea585e641b3f8a5801f

  • C:\Users\Admin\AppData\Local\Temp\AEBBCBE584B2B8D75DC74B6388E4FB0BFF0D3E38A0A496D66147C525687727D1.EXE

    Filesize

    100KB

    MD5

    1d6c8aabf913653e54f366e3c0c82d66

    SHA1

    491e11fc6eaa44c995cbbf615b923e5e55f12b66

    SHA256

    29d97eec9a21f55f0fdf3b6acba1ff2b189af6768a885cac72c3d2d26facf982

    SHA512

    02f3f31d88494bc272b736d270cade787831fafb5cff34c52b8feaedecab3ec6ada5e8d8cbfcaa6405421103653452558a00a8d4ea456ea585e641b3f8a5801f

  • C:\Users\Admin\AppData\Local\Temp\aebbcbe584b2b8d75dc74b6388e4fb0bff0d3e38a0a496d66147c525687727d1.exe

    Filesize

    16KB

    MD5

    8ad17f33bdcc0ea294e074e0e74cad3b

    SHA1

    81b4608a3e11a24157e9c22ac45ff1b12d8c476e

    SHA256

    27d6644771a935ec0547258dff56bbfba151f2addf09c51b1edc6a9a3207d2c5

    SHA512

    f5337e5edc0386c597d8ae787e6f4a7fdac393d2aee55eb7b3a15cf82d9fb5757724d424aab0959a0c4ebf79c9cdd560d9157295a26edffe39ff6f056a526ded

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    84KB

    MD5

    f694e5e8addbad27d9509e2b2c85a869

    SHA1

    4ef8b740ee22c0ca35673fecd676828f293b019e

    SHA256

    a1e9fd8e6b8ac61c715484760ed3880fe5051bd14066435cf4b778514b86cfe5

    SHA512

    805701b11e3b165d66144bf8c623adad0174040f74453036b8c5af6e3d3a5cd245346b3343ef6bdb82c67ee826135b71b023581c630dbd72f86af23976436ee0

  • C:\Windows\MSWDM.EXE

    Filesize

    84KB

    MD5

    f694e5e8addbad27d9509e2b2c85a869

    SHA1

    4ef8b740ee22c0ca35673fecd676828f293b019e

    SHA256

    a1e9fd8e6b8ac61c715484760ed3880fe5051bd14066435cf4b778514b86cfe5

    SHA512

    805701b11e3b165d66144bf8c623adad0174040f74453036b8c5af6e3d3a5cd245346b3343ef6bdb82c67ee826135b71b023581c630dbd72f86af23976436ee0

  • C:\Windows\MSWDM.EXE

    Filesize

    84KB

    MD5

    f694e5e8addbad27d9509e2b2c85a869

    SHA1

    4ef8b740ee22c0ca35673fecd676828f293b019e

    SHA256

    a1e9fd8e6b8ac61c715484760ed3880fe5051bd14066435cf4b778514b86cfe5

    SHA512

    805701b11e3b165d66144bf8c623adad0174040f74453036b8c5af6e3d3a5cd245346b3343ef6bdb82c67ee826135b71b023581c630dbd72f86af23976436ee0

  • C:\Windows\MSWDM.EXE

    Filesize

    84KB

    MD5

    f694e5e8addbad27d9509e2b2c85a869

    SHA1

    4ef8b740ee22c0ca35673fecd676828f293b019e

    SHA256

    a1e9fd8e6b8ac61c715484760ed3880fe5051bd14066435cf4b778514b86cfe5

    SHA512

    805701b11e3b165d66144bf8c623adad0174040f74453036b8c5af6e3d3a5cd245346b3343ef6bdb82c67ee826135b71b023581c630dbd72f86af23976436ee0

  • C:\Windows\dev516B.tmp

    Filesize

    16KB

    MD5

    8ad17f33bdcc0ea294e074e0e74cad3b

    SHA1

    81b4608a3e11a24157e9c22ac45ff1b12d8c476e

    SHA256

    27d6644771a935ec0547258dff56bbfba151f2addf09c51b1edc6a9a3207d2c5

    SHA512

    f5337e5edc0386c597d8ae787e6f4a7fdac393d2aee55eb7b3a15cf82d9fb5757724d424aab0959a0c4ebf79c9cdd560d9157295a26edffe39ff6f056a526ded

  • \Users\Admin\AppData\Local\Temp\aebbcbe584b2b8d75dc74b6388e4fb0bff0d3e38a0a496d66147c525687727d1.exe

    Filesize

    16KB

    MD5

    8ad17f33bdcc0ea294e074e0e74cad3b

    SHA1

    81b4608a3e11a24157e9c22ac45ff1b12d8c476e

    SHA256

    27d6644771a935ec0547258dff56bbfba151f2addf09c51b1edc6a9a3207d2c5

    SHA512

    f5337e5edc0386c597d8ae787e6f4a7fdac393d2aee55eb7b3a15cf82d9fb5757724d424aab0959a0c4ebf79c9cdd560d9157295a26edffe39ff6f056a526ded

  • \Users\Admin\AppData\Local\Temp\aebbcbe584b2b8d75dc74b6388e4fb0bff0d3e38a0a496d66147c525687727d1.exe

    Filesize

    16KB

    MD5

    8ad17f33bdcc0ea294e074e0e74cad3b

    SHA1

    81b4608a3e11a24157e9c22ac45ff1b12d8c476e

    SHA256

    27d6644771a935ec0547258dff56bbfba151f2addf09c51b1edc6a9a3207d2c5

    SHA512

    f5337e5edc0386c597d8ae787e6f4a7fdac393d2aee55eb7b3a15cf82d9fb5757724d424aab0959a0c4ebf79c9cdd560d9157295a26edffe39ff6f056a526ded

  • memory/1116-69-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1172-72-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1172-73-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1408-65-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

    Filesize

    8KB

  • memory/1584-57-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1948-71-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB