Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:10

General

  • Target

    2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe

  • Size

    599KB

  • MD5

    579ba1c8fe2dafba83ffe2aba5f6a07d

  • SHA1

    35ef464b64c6e0c2bc97d619fd9a1e54dde2c33e

  • SHA256

    2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157

  • SHA512

    5ac8a105b59d188a6b33402782595a47df3f1a17385abaa9f3e5bd8c2f64751663609980625184a7e333522dbe1a0c9ba551c0262709882aa634699097c5086d

  • SSDEEP

    12288:xMrey906Emu9BKLLbroX1IDDToyXIi6a9YEGeSduYyz:fydoBaga9XJx+/eSduYa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe
    "C:\Users\Admin\AppData\Local\Temp\2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exe

    Filesize

    307KB

    MD5

    10f05a531c697fd3fc57c14fbcdca498

    SHA1

    30ef526e424157a6bead127b5c3eda60ce7683d0

    SHA256

    6f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9

    SHA512

    d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exe

    Filesize

    307KB

    MD5

    10f05a531c697fd3fc57c14fbcdca498

    SHA1

    30ef526e424157a6bead127b5c3eda60ce7683d0

    SHA256

    6f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9

    SHA512

    d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exe

    Filesize

    136KB

    MD5

    1dd5f288f46e1dc1964b5b595c31d6b3

    SHA1

    5fa9eda2c2eed89dd7edb694cf298cdde03f5984

    SHA256

    3aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d

    SHA512

    4f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exe

    Filesize

    136KB

    MD5

    1dd5f288f46e1dc1964b5b595c31d6b3

    SHA1

    5fa9eda2c2eed89dd7edb694cf298cdde03f5984

    SHA256

    3aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d

    SHA512

    4f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exe

    Filesize

    307KB

    MD5

    10f05a531c697fd3fc57c14fbcdca498

    SHA1

    30ef526e424157a6bead127b5c3eda60ce7683d0

    SHA256

    6f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9

    SHA512

    d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exe

    Filesize

    307KB

    MD5

    10f05a531c697fd3fc57c14fbcdca498

    SHA1

    30ef526e424157a6bead127b5c3eda60ce7683d0

    SHA256

    6f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9

    SHA512

    d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exe

    Filesize

    136KB

    MD5

    1dd5f288f46e1dc1964b5b595c31d6b3

    SHA1

    5fa9eda2c2eed89dd7edb694cf298cdde03f5984

    SHA256

    3aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d

    SHA512

    4f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exe

    Filesize

    136KB

    MD5

    1dd5f288f46e1dc1964b5b595c31d6b3

    SHA1

    5fa9eda2c2eed89dd7edb694cf298cdde03f5984

    SHA256

    3aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d

    SHA512

    4f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df

  • memory/1868-74-0x0000000001280000-0x00000000012A8000-memory.dmp

    Filesize

    160KB

  • memory/1868-75-0x00000000070A0000-0x00000000070E0000-memory.dmp

    Filesize

    256KB

  • memory/1868-76-0x00000000070A0000-0x00000000070E0000-memory.dmp

    Filesize

    256KB