Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/02/2023, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
General
-
Target
tmp.exe
-
Size
2.0MB
-
MD5
c4377d5563d3c6b6af68a0a103a69c59
-
SHA1
302a6299b0550510514f26df2d91f88c66248770
-
SHA256
6fb43252ffec27bc90f9a92d995290ad67156a73288a5cbd054c4059f6c8e0fe
-
SHA512
4e3cc901c864c2aa326a6abe2d97ae244bb91b86dfba50b1d7671c04d48211a126781e641f8cec91300bfd624ec2ba2eea044f811b25808c1d10cdbbee4297d8
-
SSDEEP
49152:cylves1KfQtrRtGHzdyVSNO41wrkQPPAquD+t03T8:tf0ot6pw613Qwq4+t03T8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1264 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 980 tmp.exe 980 tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" tmp.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 1 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 980 wrote to memory of 1264 980 tmp.exe 28 PID 980 wrote to memory of 1264 980 tmp.exe 28 PID 980 wrote to memory of 1264 980 tmp.exe 28 PID 980 wrote to memory of 1264 980 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe2⤵
- Executes dropped EXE
PID:1264
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610.9MB
MD5b4a8089b223a177e56bc550bf479bd71
SHA16ca9a8f082fabde11efa08e503cf3578fbfe6232
SHA256dcc7f43d29e32051eb0a7fe84a0e6d7771fa9d16e05aef0126a9a971b4e95507
SHA51276f75e2cc32a5069221a3f43b4a1c13d249f6ed0ca783f420f2090b68c805b817b8ecd4e6278abd92eb91d339548e77d27230121ffe36348ef1e4800bef47372
-
Filesize
618.4MB
MD57ce5aae43726925dbcc6d3cc9ffdf77d
SHA1bbb088f9230822db653b8fb51ae09609e54d3c16
SHA256c957cd3a224ad0cae7347737c6146aa92966c88747861d94a3ace4fbb2ee20bc
SHA512694a6df65b9031824dfe0f0e18df4bbe2ec2a66c0b2ff21b29d815b294c186f8cdc6a753079bf6ea1e5108da04cb75271ca8eaa04a65394810c1fad1bf09e1c9
-
Filesize
637.8MB
MD5d287d013ca5a751d6f5e1810185c7db4
SHA18216efb82e0b2574b8857198d31be41257fcd4de
SHA25604eac2f29c8f20666ec98f67ed016b398255ac151f6436dede7fba2a2c2e834a
SHA512f376cdadc6ce8ebdf13d4fdd06b8ca37599c8ff35c05df0a2a5fe11b9ae51da40c44a2200befd3f442c01cbe3d6b9ab3cfb347946d3da092a01c1dea0935c24c