Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/02/2023, 04:11

General

  • Target

    file.exe

  • Size

    1.9MB

  • MD5

    69fcca0d67ac4be82b5eed6ce4f155bc

  • SHA1

    64e0406663e0355b75a29220ee4490fb25725a90

  • SHA256

    291003d022e462dc6ece1e0d6cf6a636520060358683596b71623f1c71a539c3

  • SHA512

    21a3a7ca680adcb17b9fcb5b7b6ca01406d0305048dba6ad4b97f1002f8b3023122c770a76ded66eb37d7d0a1732a90f2ceb0b278e60919525e88523c7aa981c

  • SSDEEP

    49152:6zDL7X+Yep6nskNEUCeneZa6Hy4vn78HQSUkXe:mteApNEdeeZa6dYokO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
      2⤵
      • Executes dropped EXE
      PID:444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    707.9MB

    MD5

    e211ff9094d743eb1b831e3f29c08027

    SHA1

    b42543bad3b093f20b1e330cd2cd21da53d8d599

    SHA256

    10a48de7f44fdb66722ae028ba2e47840bb96e014788b191e8e9a8ce3d442d66

    SHA512

    4296e82f6e91c9b96158cf6c9bb9970d4ae6a4246cbe3a2f1a8668ffc467489d56122f2ea987b3f35116497f41e253caef24585323cd33f24439b2af72424e28

  • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

    Filesize

    707.9MB

    MD5

    e211ff9094d743eb1b831e3f29c08027

    SHA1

    b42543bad3b093f20b1e330cd2cd21da53d8d599

    SHA256

    10a48de7f44fdb66722ae028ba2e47840bb96e014788b191e8e9a8ce3d442d66

    SHA512

    4296e82f6e91c9b96158cf6c9bb9970d4ae6a4246cbe3a2f1a8668ffc467489d56122f2ea987b3f35116497f41e253caef24585323cd33f24439b2af72424e28

  • memory/444-140-0x000000000255D000-0x0000000002707000-memory.dmp

    Filesize

    1.7MB

  • memory/444-141-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/444-142-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3408-132-0x00000000025FA000-0x00000000027A4000-memory.dmp

    Filesize

    1.7MB

  • memory/3408-133-0x00000000027D0000-0x0000000002BA0000-memory.dmp

    Filesize

    3.8MB

  • memory/3408-134-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3408-135-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3408-139-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB