Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2023, 11:40

General

  • Target

    avisynth 2.6.exe

  • Size

    6.2MB

  • MD5

    7299618ccdfa57a2302381fd104234d6

  • SHA1

    e153e2161ea4400ebe7576732fe9576cf6b760b1

  • SHA256

    a68272db4b475e720ede626c81d750b75ad585f18e0da766301372bbc48a3801

  • SHA512

    5506f5a4ff4b9a9c44526d2302ec61b628b625ad7c011ac1bffc70e3b4304465f8f5ab50024bdba44c6177fda258fe962cb0299b790ba85ca1ec49c1c7d158a2

  • SSDEEP

    98304:kxJBlzXyx1nNUxG0fX03SAvVRY4s6i3SkrCMmD2gPWh7BC6qWOy1KxCuo1b:uHOKGaMNRw2bOh7BCGz4ob

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\avisynth 2.6.exe
    "C:\Users\Admin\AppData\Local\Temp\avisynth 2.6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nstE8CB.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    8c909780802ac2097ea4132e6375acd2

    SHA1

    b35fbda0725d7c66281d5c340b53eb5d54922583

    SHA256

    c66b568cd675806a499273e3e8aeda350425aac17fc24342ed54e477417cdc0f

    SHA512

    e94a37c586e55de8b61b427c14a385dcc57f3602d3dace90ad4663609da14a922cb78f76a58ed211549e987ba6f130cf2581eb48bcad2c9c25c6dc93a7ff6d08

  • memory/1460-54-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1460-56-0x0000000000240000-0x0000000000274000-memory.dmp

    Filesize

    208KB

  • memory/1460-55-0x0000000000240000-0x0000000000274000-memory.dmp

    Filesize

    208KB

  • memory/1460-66-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB