Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    181s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 23:55

General

  • Target

    e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe

  • Size

    29KB

  • MD5

    37aeff0ba7162b6a69e33022de46b83e

  • SHA1

    6459c98e1e41f1d9d331d4f4e06a6579ab6bcc95

  • SHA256

    e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d

  • SHA512

    4278913fa037683dff64aa34edaa08cdf1958415c3ef77cc8ee0d91872c3df7a87cdb62b515861912e0c63de1c1bbd913629d827827b827429410c5c0ae1cebc

  • SSDEEP

    384:7Xb1JAZw7jtigdih7alQylk1Q//YYJLW7wycJbgz:31JAZw/rdihelQjQntLhb8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe
    "C:\Users\Admin\AppData\Local\Temp\e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Users\Admin\AppData\Local\Temp\e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe
      "C:\Users\Admin\AppData\Local\Temp\e0c49efa560d068150547034710914f28c99e738a52a7bcd49ac1f9d6b9ca98d.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Windows\Googlenr.EXE
        "C:\Windows\Googlenr.EXE"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Windows\Googlenr.EXE
          "C:\Windows\Googlenr.EXE"
          4⤵
          • Executes dropped EXE
          • Deletes itself
          • Suspicious behavior: EnumeratesProcesses
          PID:584

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MyTemp

    Filesize

    102B

    MD5

    d0fd4c396b889492fb6055176a30b06c

    SHA1

    cd1edb7468b94e6abd6fbafd75d3fb5530bef037

    SHA256

    e8889ea8e42678bcbdb1d0302083326fd58f7641a68217e272350b05fa6b248a

    SHA512

    6645b46caddfd23efe8bfcecdf5a526c1b229d46b3de23e8b5cd9b0a5bd2bbfce8c2e2ab92307353a0ef2ca9d028ad758ba553d3da37ce9e9ed6fb0ee270e9e7

  • C:\Windows\Googlenr.EXE

    Filesize

    14.9MB

    MD5

    ebd3e4fd5d1ea16e1e19335cf1d12754

    SHA1

    c5f6773329bb1e704bbd820a4233dd1be01dae25

    SHA256

    d03ef4ada1cfe10fc983b2bc13b06cf42880256f5e392190d585bd7b6cb69dc9

    SHA512

    9cb8bbc432bbe1fd3073c36ac2dee29a2cbe150b2a7c71b8fce1fed733c9f06e68563543b47ea29df5aff861159a183178521c751f0f77bf79c38aecdeb2b5d4

  • C:\Windows\Googlenr.EXE

    Filesize

    14.9MB

    MD5

    ebd3e4fd5d1ea16e1e19335cf1d12754

    SHA1

    c5f6773329bb1e704bbd820a4233dd1be01dae25

    SHA256

    d03ef4ada1cfe10fc983b2bc13b06cf42880256f5e392190d585bd7b6cb69dc9

    SHA512

    9cb8bbc432bbe1fd3073c36ac2dee29a2cbe150b2a7c71b8fce1fed733c9f06e68563543b47ea29df5aff861159a183178521c751f0f77bf79c38aecdeb2b5d4

  • C:\Windows\Googlenr.EXE

    Filesize

    14.9MB

    MD5

    ebd3e4fd5d1ea16e1e19335cf1d12754

    SHA1

    c5f6773329bb1e704bbd820a4233dd1be01dae25

    SHA256

    d03ef4ada1cfe10fc983b2bc13b06cf42880256f5e392190d585bd7b6cb69dc9

    SHA512

    9cb8bbc432bbe1fd3073c36ac2dee29a2cbe150b2a7c71b8fce1fed733c9f06e68563543b47ea29df5aff861159a183178521c751f0f77bf79c38aecdeb2b5d4

  • memory/1876-54-0x00000000752B1000-0x00000000752B3000-memory.dmp

    Filesize

    8KB