Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:34

General

  • Target

    1233aee5e3d608f415dc0315fcd507e245c676eb927cb6f7c52e96c618a506ef.exe

  • Size

    376KB

  • MD5

    6b5435940a9db7a53aa1b005ea2699b4

  • SHA1

    57c0008081904d4eb4e19da176a503d2a055ba9e

  • SHA256

    1233aee5e3d608f415dc0315fcd507e245c676eb927cb6f7c52e96c618a506ef

  • SHA512

    cf711c74e254757860111043345745ec56304f4dc6b5e1aabe583de60a882a0871ed0d40cf91c8515ab8a2cc381c9535edd1eccce63f5baa094eda2518abc67c

  • SSDEEP

    6144:KFy+bnr++p0yN90QEaIaRfitxqjblnT/qS1u3NJZkOSQteffAyQ:jMriy906RKPAlnTiSiNwbQEAyQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1233aee5e3d608f415dc0315fcd507e245c676eb927cb6f7c52e96c618a506ef.exe
    "C:\Users\Admin\AppData\Local\Temp\1233aee5e3d608f415dc0315fcd507e245c676eb927cb6f7c52e96c618a506ef.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2500785.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2500785.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4235049.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4235049.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1856

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2500785.exe

    Filesize

    204KB

    MD5

    d4a6904ae8d719086317c061a24247b5

    SHA1

    bfc05ab68b1411d9cd4591d6c28d7410c8272b2e

    SHA256

    1db760e115af9d274b875588485cffa3acc3d7030d06a649871ed87ac4b6857d

    SHA512

    f9702983b3b3a2d65aa1361ade4f1ec6273779e655220b85aeb09e623274a9d597b50cc4fd921239d70057eca4587172280b6b8f6ec3917795885525b9d0ad17

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2500785.exe

    Filesize

    204KB

    MD5

    d4a6904ae8d719086317c061a24247b5

    SHA1

    bfc05ab68b1411d9cd4591d6c28d7410c8272b2e

    SHA256

    1db760e115af9d274b875588485cffa3acc3d7030d06a649871ed87ac4b6857d

    SHA512

    f9702983b3b3a2d65aa1361ade4f1ec6273779e655220b85aeb09e623274a9d597b50cc4fd921239d70057eca4587172280b6b8f6ec3917795885525b9d0ad17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4235049.exe

    Filesize

    136KB

    MD5

    8f30f7f88229560306c5959c605316de

    SHA1

    36f26a905a9743f6dd1608e39b37d1116cafcc0a

    SHA256

    3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

    SHA512

    267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4235049.exe

    Filesize

    136KB

    MD5

    8f30f7f88229560306c5959c605316de

    SHA1

    36f26a905a9743f6dd1608e39b37d1116cafcc0a

    SHA256

    3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

    SHA512

    267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2500785.exe

    Filesize

    204KB

    MD5

    d4a6904ae8d719086317c061a24247b5

    SHA1

    bfc05ab68b1411d9cd4591d6c28d7410c8272b2e

    SHA256

    1db760e115af9d274b875588485cffa3acc3d7030d06a649871ed87ac4b6857d

    SHA512

    f9702983b3b3a2d65aa1361ade4f1ec6273779e655220b85aeb09e623274a9d597b50cc4fd921239d70057eca4587172280b6b8f6ec3917795885525b9d0ad17

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x2500785.exe

    Filesize

    204KB

    MD5

    d4a6904ae8d719086317c061a24247b5

    SHA1

    bfc05ab68b1411d9cd4591d6c28d7410c8272b2e

    SHA256

    1db760e115af9d274b875588485cffa3acc3d7030d06a649871ed87ac4b6857d

    SHA512

    f9702983b3b3a2d65aa1361ade4f1ec6273779e655220b85aeb09e623274a9d597b50cc4fd921239d70057eca4587172280b6b8f6ec3917795885525b9d0ad17

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g4235049.exe

    Filesize

    136KB

    MD5

    8f30f7f88229560306c5959c605316de

    SHA1

    36f26a905a9743f6dd1608e39b37d1116cafcc0a

    SHA256

    3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

    SHA512

    267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g4235049.exe

    Filesize

    136KB

    MD5

    8f30f7f88229560306c5959c605316de

    SHA1

    36f26a905a9743f6dd1608e39b37d1116cafcc0a

    SHA256

    3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

    SHA512

    267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

  • memory/1856-74-0x0000000000BB0000-0x0000000000BD8000-memory.dmp

    Filesize

    160KB

  • memory/1856-75-0x0000000000870000-0x00000000008B0000-memory.dmp

    Filesize

    256KB

  • memory/1856-76-0x0000000000870000-0x00000000008B0000-memory.dmp

    Filesize

    256KB