Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:18

General

  • Target

    33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe

  • Size

    96KB

  • MD5

    c22b9b7fd851e2f4d24d7fdc1d67a231

  • SHA1

    6c309c1146fd6f753e3425f1c50c8a1a6a34d0ea

  • SHA256

    33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673

  • SHA512

    91b19696a93f21f403055b576e55e3257f739821aeafab7c77cfbd0ace9982ea892b8067e31f456d5cab7f41d6bbd27286370f73de12d92a16c3bf36b2788afc

  • SSDEEP

    1536:lDFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prpnE+uv:l9S4jHS8q/3nTzePCwNUh4E9pnHuv

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe
    "C:\Users\Admin\AppData\Local\Temp\33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2040
    • \??\c:\users\admin\appdata\local\ebtvhneevn
      "C:\Users\Admin\AppData\Local\Temp\33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe" a -sc:\users\admin\appdata\local\temp\33225bc390058d3bf7c1c73d8020faa3934420dec87c86e865bf48a4dd51f673.exe
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      PID:1512

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\ebtvhneevn

    Filesize

    21.0MB

    MD5

    dfca98783bb280f242e920bc9b44a6a5

    SHA1

    e6c2204affd97523e92cb2044f35de098052c6a9

    SHA256

    9c7f870f65584f993ea8cf9a3fb4e1def17790b91000ee0ed04506eb81b98ed6

    SHA512

    b3910713865a371adbc541da4c1737484d384a4f4d92c8ea34603dd2c3380f541bed4f5d7dc1101ccdb3d3df8ee93fb9f1306f7e3aa1e547e5b184f497ee5129

  • \Users\Admin\AppData\Local\ebtvhneevn

    Filesize

    21.0MB

    MD5

    dfca98783bb280f242e920bc9b44a6a5

    SHA1

    e6c2204affd97523e92cb2044f35de098052c6a9

    SHA256

    9c7f870f65584f993ea8cf9a3fb4e1def17790b91000ee0ed04506eb81b98ed6

    SHA512

    b3910713865a371adbc541da4c1737484d384a4f4d92c8ea34603dd2c3380f541bed4f5d7dc1101ccdb3d3df8ee93fb9f1306f7e3aa1e547e5b184f497ee5129

  • \Users\Admin\AppData\Local\ebtvhneevn

    Filesize

    21.0MB

    MD5

    dfca98783bb280f242e920bc9b44a6a5

    SHA1

    e6c2204affd97523e92cb2044f35de098052c6a9

    SHA256

    9c7f870f65584f993ea8cf9a3fb4e1def17790b91000ee0ed04506eb81b98ed6

    SHA512

    b3910713865a371adbc541da4c1737484d384a4f4d92c8ea34603dd2c3380f541bed4f5d7dc1101ccdb3d3df8ee93fb9f1306f7e3aa1e547e5b184f497ee5129

  • memory/1512-60-0x0000000000400000-0x000000000044E374-memory.dmp

    Filesize

    312KB

  • memory/1512-61-0x0000000000400000-0x000000000044E374-memory.dmp

    Filesize

    312KB

  • memory/2040-54-0x0000000000400000-0x000000000044E374-memory.dmp

    Filesize

    312KB

  • memory/2040-55-0x0000000000400000-0x000000000044E374-memory.dmp

    Filesize

    312KB