Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:19

General

  • Target

    06d48c2a74323de006c9ecc8ea3392e574cade6f2fd1ab1403959c0a2662ff75.exe

  • Size

    376KB

  • MD5

    67369d806a77b5701196bbdf978d6683

  • SHA1

    5df72527a581244410c744136d531a146ca3097e

  • SHA256

    06d48c2a74323de006c9ecc8ea3392e574cade6f2fd1ab1403959c0a2662ff75

  • SHA512

    5d37bf508725e53cc9a9598c4bed4bce229364bfc8db601ceb2e73c83b3751f89cb620f6f268515496d7e3abcbf4803e0b3c9755ff2a6ffe60ef6d34512fa8e9

  • SSDEEP

    6144:KDy+bnr+Bp0yN90QEAXAprVp7EkkmRaVklpBagdSMV+CXeejkwK8AA:hMr5y90KYrVJEORaVcxSw+C4wUA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06d48c2a74323de006c9ecc8ea3392e574cade6f2fd1ab1403959c0a2662ff75.exe
    "C:\Users\Admin\AppData\Local\Temp\06d48c2a74323de006c9ecc8ea3392e574cade6f2fd1ab1403959c0a2662ff75.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6236474.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6236474.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1446515.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1446515.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6236474.exe

    Filesize

    204KB

    MD5

    bfe7d0df3563cf0349d8340aab2c5858

    SHA1

    5ac5968ac68d7a711ef5bda858c4a85f11ad7a7f

    SHA256

    88a2c03201eeb44350c4a3bd860e1b45e203a7e47be08d42dbc6b9fad90ad84e

    SHA512

    0651cb8ad193081ca34e513d66095447573249faf3d341fd5c60008b3ebd0648d842d9bbb15b258f26ac8e2b3f0d520f715367b15b65c3b49cf9eb26d58b4431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6236474.exe

    Filesize

    204KB

    MD5

    bfe7d0df3563cf0349d8340aab2c5858

    SHA1

    5ac5968ac68d7a711ef5bda858c4a85f11ad7a7f

    SHA256

    88a2c03201eeb44350c4a3bd860e1b45e203a7e47be08d42dbc6b9fad90ad84e

    SHA512

    0651cb8ad193081ca34e513d66095447573249faf3d341fd5c60008b3ebd0648d842d9bbb15b258f26ac8e2b3f0d520f715367b15b65c3b49cf9eb26d58b4431

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1446515.exe

    Filesize

    136KB

    MD5

    25432ffd81bdd925172138e87f5e8284

    SHA1

    cac5f3f0630ac7b085cfccc7afe6824d5a96b10c

    SHA256

    f6bcd9afd2adaea0576ce5a226511073660814d3657bdeff58bb714a1a8b8505

    SHA512

    383e3116d6f5ebf25b6619cc772849c0cb467b4f00cd9fa012b1f8bef4da3c0f30dd0d2e50f824d89ddfab5aa9bbf9901a4f36665f5dea7371975a763bb87072

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1446515.exe

    Filesize

    136KB

    MD5

    25432ffd81bdd925172138e87f5e8284

    SHA1

    cac5f3f0630ac7b085cfccc7afe6824d5a96b10c

    SHA256

    f6bcd9afd2adaea0576ce5a226511073660814d3657bdeff58bb714a1a8b8505

    SHA512

    383e3116d6f5ebf25b6619cc772849c0cb467b4f00cd9fa012b1f8bef4da3c0f30dd0d2e50f824d89ddfab5aa9bbf9901a4f36665f5dea7371975a763bb87072

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x6236474.exe

    Filesize

    204KB

    MD5

    bfe7d0df3563cf0349d8340aab2c5858

    SHA1

    5ac5968ac68d7a711ef5bda858c4a85f11ad7a7f

    SHA256

    88a2c03201eeb44350c4a3bd860e1b45e203a7e47be08d42dbc6b9fad90ad84e

    SHA512

    0651cb8ad193081ca34e513d66095447573249faf3d341fd5c60008b3ebd0648d842d9bbb15b258f26ac8e2b3f0d520f715367b15b65c3b49cf9eb26d58b4431

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x6236474.exe

    Filesize

    204KB

    MD5

    bfe7d0df3563cf0349d8340aab2c5858

    SHA1

    5ac5968ac68d7a711ef5bda858c4a85f11ad7a7f

    SHA256

    88a2c03201eeb44350c4a3bd860e1b45e203a7e47be08d42dbc6b9fad90ad84e

    SHA512

    0651cb8ad193081ca34e513d66095447573249faf3d341fd5c60008b3ebd0648d842d9bbb15b258f26ac8e2b3f0d520f715367b15b65c3b49cf9eb26d58b4431

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g1446515.exe

    Filesize

    136KB

    MD5

    25432ffd81bdd925172138e87f5e8284

    SHA1

    cac5f3f0630ac7b085cfccc7afe6824d5a96b10c

    SHA256

    f6bcd9afd2adaea0576ce5a226511073660814d3657bdeff58bb714a1a8b8505

    SHA512

    383e3116d6f5ebf25b6619cc772849c0cb467b4f00cd9fa012b1f8bef4da3c0f30dd0d2e50f824d89ddfab5aa9bbf9901a4f36665f5dea7371975a763bb87072

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g1446515.exe

    Filesize

    136KB

    MD5

    25432ffd81bdd925172138e87f5e8284

    SHA1

    cac5f3f0630ac7b085cfccc7afe6824d5a96b10c

    SHA256

    f6bcd9afd2adaea0576ce5a226511073660814d3657bdeff58bb714a1a8b8505

    SHA512

    383e3116d6f5ebf25b6619cc772849c0cb467b4f00cd9fa012b1f8bef4da3c0f30dd0d2e50f824d89ddfab5aa9bbf9901a4f36665f5dea7371975a763bb87072

  • memory/876-74-0x0000000000210000-0x0000000000238000-memory.dmp

    Filesize

    160KB

  • memory/876-75-0x0000000000BB0000-0x0000000000BF0000-memory.dmp

    Filesize

    256KB

  • memory/876-76-0x0000000000BB0000-0x0000000000BF0000-memory.dmp

    Filesize

    256KB