Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/08/2023, 09:35

230805-lkkdsabb42 7

19/07/2023, 08:43

230719-kmkxnaah5v 8

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2023, 09:35

General

  • Target

    24F72BFF.exe

  • Size

    4.9MB

  • MD5

    af083dae1594bdc4afac0fc68dfbad5f

  • SHA1

    16382113647d5a2ec1af9250faaf80bc998d44d3

  • SHA256

    28a646ddb6b3dc629f272733ff18ab5be8a5bd958b9b744165f43d781b5a689f

  • SHA512

    06286c44db09227c5ddeedcf51d30775885e8a4ee009beaef6924d6872f4975ad3dee8c0f7503443d8a21ff4d6a18319a1c021433d497ff9f495d4f6760a046c

  • SSDEEP

    98304:VCRO8LxoKamrrviBpj1IpegiqG347SylA9YZGUgzMeTgbA:lEolmrrviBpHgi/347/gYZPeoA

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24F72BFF.exe
    "C:\Users\Admin\AppData\Local\Temp\24F72BFF.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\files.exe

    Filesize

    800B

    MD5

    7bc0525c62dac305615a0873f44301b8

    SHA1

    6e912060725b679807c1d09903a304d5a663607e

    SHA256

    0dcd6971a9fa2f755e52ecf02debf9e5c02248a3b74c277e4ef43b68574d5240

    SHA512

    7b84ba21c85ab1c1a85908f11605c4722a7df15044dafc5c6c5eb70659a414479ff8d7b40aaca428db698ce49cfe455e01598c654f571611255f30f91501a41b

  • \Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll

    Filesize

    8.4MB

    MD5

    8b6c94bbdbfb213e94a5dcb4fac28ce3

    SHA1

    b56102ca4f03556f387f8b30e2b404efabe0cb65

    SHA256

    982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53

    SHA512

    9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

  • memory/2208-58-0x0000000000EF0000-0x0000000001533000-memory.dmp

    Filesize

    6.3MB

  • memory/2208-66-0x0000000003D10000-0x0000000003D1B000-memory.dmp

    Filesize

    44KB

  • memory/2208-54-0x0000000000400000-0x0000000000A43000-memory.dmp

    Filesize

    6.3MB

  • memory/2208-59-0x0000000000400000-0x0000000000A43000-memory.dmp

    Filesize

    6.3MB

  • memory/2208-61-0x0000000003800000-0x0000000003804000-memory.dmp

    Filesize

    16KB

  • memory/2208-60-0x0000000003810000-0x0000000003814000-memory.dmp

    Filesize

    16KB

  • memory/2208-56-0x0000000000EF0000-0x0000000001533000-memory.dmp

    Filesize

    6.3MB

  • memory/2208-55-0x0000000000EF0000-0x0000000001533000-memory.dmp

    Filesize

    6.3MB

  • memory/2208-67-0x0000000003D10000-0x0000000003D1B000-memory.dmp

    Filesize

    44KB

  • memory/2208-57-0x00000000023F0000-0x000000000244F000-memory.dmp

    Filesize

    380KB

  • memory/2208-81-0x0000000000400000-0x0000000000A43000-memory.dmp

    Filesize

    6.3MB

  • memory/2208-82-0x0000000000400000-0x0000000000A43000-memory.dmp

    Filesize

    6.3MB

  • memory/2208-83-0x0000000000EF0000-0x0000000001533000-memory.dmp

    Filesize

    6.3MB

  • memory/2208-84-0x00000000023F0000-0x000000000244F000-memory.dmp

    Filesize

    380KB