Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

30/06/2023, 08:09

230630-j2ll3agf35 7

30/06/2023, 08:03

230630-jxpg6age93 10

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2023, 08:03

General

  • Target

    新建文件夹 (2)/_D0DE469BB8424834A796EDFE1D0176CA.exe

  • Size

    2.1MB

  • MD5

    4ac3d60c4850e37a9b39976c1553df05

  • SHA1

    45e5a0e35be7034e38543fc1a0c3f9ca3808fa5c

  • SHA256

    c53eac22482ec00bebb3c006d442c7b48a448f9d0cc16a743af9a88de1a1da6c

  • SHA512

    7b1e7044deab0f485e1968000df3409d003c38728ab6c07026b5818ed3f0550c32afa0149903e6696e306284b2680426ca8e38540292b35f60d3a8827d789753

  • SSDEEP

    49152:vepDNj9UCdjGNjXn/S1qe7FFsOAckBNMmH3Cy+3u:vKNjuCpaj61RjONQy++

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\新建文件夹 (2)\_D0DE469BB8424834A796EDFE1D0176CA.exe
    "C:\Users\Admin\AppData\Local\Temp\新建文件夹 (2)\_D0DE469BB8424834A796EDFE1D0176CA.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2776
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    PID:5108

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7RMPX3MN\OHLL01H6.htm

    Filesize

    377KB

    MD5

    d51acb034a9a5d7baa2907d8808e229f

    SHA1

    18452d07dc3a510b51478a77a9610f3fba65aabd

    SHA256

    6465a3bcbec0a8698e340bf1664e28aabd7bbb5d1705034c1280d49ee7de67da

    SHA512

    213d551f990d79d997ad2d02867804acd4404e7c281607a0280b9509abe33c38de038ea0961f0a2433a756c5eb88e3aaac2178c2027bcbdc8e0579b72c56cdb8

  • C:\Users\Public\Pictures\gj.dll

    Filesize

    41KB

    MD5

    d0a62532cecac152bc553474d5899a94

    SHA1

    fbb691817dfbae7518648c82304e42288b8354e3

    SHA256

    242911c8ec9f435569637d5490219a181eb0438c98f8357227d6424e97485f49

    SHA512

    9e2150873aa2ce7fa360a5dda0e490f497b716282e827d89e85d50e166a73bd54bbedfa54b5fdb22b31dcfa297b564f922d2cbb152fe490ac336dd2e0fc3ea51

  • memory/2776-133-0x0000000000400000-0x0000000000873000-memory.dmp

    Filesize

    4.4MB

  • memory/2776-134-0x0000000000400000-0x0000000000873000-memory.dmp

    Filesize

    4.4MB

  • memory/2776-142-0x0000000010000000-0x0000000010021000-memory.dmp

    Filesize

    132KB

  • memory/2776-146-0x0000000000400000-0x0000000000873000-memory.dmp

    Filesize

    4.4MB

  • memory/2776-148-0x0000000010000000-0x0000000010021000-memory.dmp

    Filesize

    132KB