Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    28s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230705-en
  • resource tags

    arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2023, 03:38

General

  • Target

    7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe

  • Size

    1.7MB

  • MD5

    07566dc1e1cd7a75b11f8cefa85245cb

  • SHA1

    ad9f60d6b923f3d492deae644ab7ea838bebc97d

  • SHA256

    7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6

  • SHA512

    fb46ca2175f18301ded5e1cbe720fc147503bc079dfa69cb091417c2a20a09d2203c059f73164a496b3dd8a9b99f5e9be4866e485098bedc5fae11bc368613be

  • SSDEEP

    24576:PgZXoZUTVdt7K7UbPLJTRaF76SB1MUewOBeuiCeeMZFvW5lekw7VHIlSr3AKjz30:u5O6SwQDCeeMf2lrsr3AKjz3Fyo2L

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe
    "C:\Users\Admin\AppData\Local\Temp\7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\27BC_bF.cpl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\27BC_bF.cpl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\27BC_bF.cpl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\27BC_bF.cpl",
            5⤵
            • Loads dropped DLL
            PID:2088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\27BC_bF.cpl

    Filesize

    1.3MB

    MD5

    9649c9b7fc5e4df4152c258c95acbd0d

    SHA1

    d57b276c577d86268ea672a8d084a24c5ba33a99

    SHA256

    8b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad

    SHA512

    f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7

  • \Users\Admin\AppData\Local\Temp\27BC_bF.cpl

    Filesize

    1.3MB

    MD5

    9649c9b7fc5e4df4152c258c95acbd0d

    SHA1

    d57b276c577d86268ea672a8d084a24c5ba33a99

    SHA256

    8b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad

    SHA512

    f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7

  • \Users\Admin\AppData\Local\Temp\27BC_bF.cpl

    Filesize

    1.3MB

    MD5

    9649c9b7fc5e4df4152c258c95acbd0d

    SHA1

    d57b276c577d86268ea672a8d084a24c5ba33a99

    SHA256

    8b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad

    SHA512

    f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7

  • \Users\Admin\AppData\Local\Temp\27BC_bF.cpl

    Filesize

    1.3MB

    MD5

    9649c9b7fc5e4df4152c258c95acbd0d

    SHA1

    d57b276c577d86268ea672a8d084a24c5ba33a99

    SHA256

    8b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad

    SHA512

    f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7

  • \Users\Admin\AppData\Local\Temp\27BC_bF.cpl

    Filesize

    1.3MB

    MD5

    9649c9b7fc5e4df4152c258c95acbd0d

    SHA1

    d57b276c577d86268ea672a8d084a24c5ba33a99

    SHA256

    8b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad

    SHA512

    f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7

  • \Users\Admin\AppData\Local\Temp\27BC_bF.cpl

    Filesize

    1.3MB

    MD5

    9649c9b7fc5e4df4152c258c95acbd0d

    SHA1

    d57b276c577d86268ea672a8d084a24c5ba33a99

    SHA256

    8b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad

    SHA512

    f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7

  • \Users\Admin\AppData\Local\Temp\27BC_bF.cpl

    Filesize

    1.3MB

    MD5

    9649c9b7fc5e4df4152c258c95acbd0d

    SHA1

    d57b276c577d86268ea672a8d084a24c5ba33a99

    SHA256

    8b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad

    SHA512

    f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7

  • \Users\Admin\AppData\Local\Temp\27BC_bF.cpl

    Filesize

    1.3MB

    MD5

    9649c9b7fc5e4df4152c258c95acbd0d

    SHA1

    d57b276c577d86268ea672a8d084a24c5ba33a99

    SHA256

    8b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad

    SHA512

    f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7

  • \Users\Admin\AppData\Local\Temp\27BC_bF.cpl

    Filesize

    1.3MB

    MD5

    9649c9b7fc5e4df4152c258c95acbd0d

    SHA1

    d57b276c577d86268ea672a8d084a24c5ba33a99

    SHA256

    8b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad

    SHA512

    f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7

  • memory/2088-67-0x00000000009A0000-0x0000000000AE3000-memory.dmp

    Filesize

    1.3MB

  • memory/2560-62-0x0000000000890000-0x00000000009D3000-memory.dmp

    Filesize

    1.3MB