Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    167s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 15:06

General

  • Target

    b1dca5cd2781e8f8ff3d2a86fbe0baf4f53eeda50af1e2e2351448d803a03e45.exe

  • Size

    62KB

  • MD5

    6a007c1449507fac0ce6f46426d3f803

  • SHA1

    c2a8d37324e6e401765f8980f5a2d71db7979dca

  • SHA256

    b1dca5cd2781e8f8ff3d2a86fbe0baf4f53eeda50af1e2e2351448d803a03e45

  • SHA512

    e9235ebfc24077a1d14850561d09f7cd4dca485dce095cf1dfc6d4f762873bfd29bad90539af63df45c804d759662910ddf59c59cbc9fa61c11bb4186422419e

  • SSDEEP

    1536:W5hpX/rzVgICY665kHYGOFfTXCFuZHiRpsrqyM0et+RGk:eZiIl6gkGFfTyFukpqG5Y0k

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1dca5cd2781e8f8ff3d2a86fbe0baf4f53eeda50af1e2e2351448d803a03e45.exe
    "C:\Users\Admin\AppData\Local\Temp\b1dca5cd2781e8f8ff3d2a86fbe0baf4f53eeda50af1e2e2351448d803a03e45.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Users\Admin\AppData\Roaming\netprotocol.exe
      C:\Users\Admin\AppData\Roaming\netprotocol.exe
      2⤵
      • Executes dropped EXE
      PID:268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    62KB

    MD5

    260a2ca1f6b19a3808811d5dd6c3be59

    SHA1

    b668cf9b0e79af129b5661470d79b27208348a59

    SHA256

    775b370074b4ea72e81cf52b5bb47af188d7b55809897cfe95431fe17ffdb1b7

    SHA512

    aa83a24f3620aca146bd755e3191f37449df1f9e60deebaf90b7fd4d306aac85202bb986cd78963b829dead5a36905981d06ed07941b0ea58188bfcf417dedb0

  • \Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    62KB

    MD5

    260a2ca1f6b19a3808811d5dd6c3be59

    SHA1

    b668cf9b0e79af129b5661470d79b27208348a59

    SHA256

    775b370074b4ea72e81cf52b5bb47af188d7b55809897cfe95431fe17ffdb1b7

    SHA512

    aa83a24f3620aca146bd755e3191f37449df1f9e60deebaf90b7fd4d306aac85202bb986cd78963b829dead5a36905981d06ed07941b0ea58188bfcf417dedb0

  • \Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    62KB

    MD5

    260a2ca1f6b19a3808811d5dd6c3be59

    SHA1

    b668cf9b0e79af129b5661470d79b27208348a59

    SHA256

    775b370074b4ea72e81cf52b5bb47af188d7b55809897cfe95431fe17ffdb1b7

    SHA512

    aa83a24f3620aca146bd755e3191f37449df1f9e60deebaf90b7fd4d306aac85202bb986cd78963b829dead5a36905981d06ed07941b0ea58188bfcf417dedb0

  • memory/268-66-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/268-65-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/960-57-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/960-54-0x0000000075F21000-0x0000000075F23000-memory.dmp

    Filesize

    8KB

  • memory/960-63-0x0000000000310000-0x0000000000339000-memory.dmp

    Filesize

    164KB

  • memory/960-64-0x0000000000310000-0x0000000000339000-memory.dmp

    Filesize

    164KB

  • memory/960-56-0x0000000000220000-0x0000000000223000-memory.dmp

    Filesize

    12KB

  • memory/960-55-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/960-67-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/960-68-0x0000000000310000-0x0000000000339000-memory.dmp

    Filesize

    164KB