Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    116s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2023, 19:24

General

  • Target

    DisplayFusionSetup-7.1.exe

  • Size

    13.1MB

  • MD5

    6cc60ca22aed205a616371128fdc91b3

  • SHA1

    99214c25a243e9e073d6394a1fa3e687509832cf

  • SHA256

    b216efba660aadd531ce7c245a43040ac7692c919fb93212a1b6c6e28ec2e2ae

  • SHA512

    387c84b90ac853cf4a002fd747dff2d995c1b4316c35ecb293a5edf81b90462c1522d41f7bce9028eeaac67b446f71d60383ef7056c5987795fe3d6b89b8d3b1

  • SSDEEP

    196608:aSQJrEU6ueoMCRLjjx6Hw+fE7+J9H5X6ch9szL7jCD7dlSOjprGM2gOuWbbG3tzD:aNSU99MCRV6vXJbML7js7dlS1M2mW6iS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DisplayFusionSetup-7.1.exe
    "C:\Users\Admin\AppData\Local\Temp\DisplayFusionSetup-7.1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Users\Admin\AppData\Local\Temp\is-VCSM5.tmp\DisplayFusionSetup-7.1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-VCSM5.tmp\DisplayFusionSetup-7.1.tmp" /SL5="$70124,13158689,119296,C:\Users\Admin\AppData\Local\Temp\DisplayFusionSetup-7.1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:576

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-VCSM5.tmp\DisplayFusionSetup-7.1.tmp

    Filesize

    1.1MB

    MD5

    f561fc494b58badd6fa28d82a7f5a83b

    SHA1

    19b66f2399a81845c61894f6d86eb3c2671c8147

    SHA256

    5450b20e665651d6285ab748eff1146ad884e2086dab8b81f8a74f14b03e0d35

    SHA512

    780c4bdd0842f0fa8e2279b49cee550984a40900501e0b4302f37c87dc73c33a3fb1f6fd0bbed7eea3f900faa6b74078d32dd41da138e2783983fa6b31169123

  • \Users\Admin\AppData\Local\Temp\is-8R0KN.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-8R0KN.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-VCSM5.tmp\DisplayFusionSetup-7.1.tmp

    Filesize

    1.1MB

    MD5

    f561fc494b58badd6fa28d82a7f5a83b

    SHA1

    19b66f2399a81845c61894f6d86eb3c2671c8147

    SHA256

    5450b20e665651d6285ab748eff1146ad884e2086dab8b81f8a74f14b03e0d35

    SHA512

    780c4bdd0842f0fa8e2279b49cee550984a40900501e0b4302f37c87dc73c33a3fb1f6fd0bbed7eea3f900faa6b74078d32dd41da138e2783983fa6b31169123

  • memory/1448-54-0x0000000075441000-0x0000000075443000-memory.dmp

    Filesize

    8KB

  • memory/1448-55-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1448-57-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1448-64-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB