Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/08/2023, 09:35

230805-lkkdsabb42 7

19/07/2023, 08:43

230719-kmkxnaah5v 8

Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2023, 09:35

General

  • Target

    24F72BFF.exe

  • Size

    4.9MB

  • MD5

    af083dae1594bdc4afac0fc68dfbad5f

  • SHA1

    16382113647d5a2ec1af9250faaf80bc998d44d3

  • SHA256

    28a646ddb6b3dc629f272733ff18ab5be8a5bd958b9b744165f43d781b5a689f

  • SHA512

    06286c44db09227c5ddeedcf51d30775885e8a4ee009beaef6924d6872f4975ad3dee8c0f7503443d8a21ff4d6a18319a1c021433d497ff9f495d4f6760a046c

  • SSDEEP

    98304:VCRO8LxoKamrrviBpj1IpegiqG347SylA9YZGUgzMeTgbA:lEolmrrviBpHgi/347/gYZPeoA

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24F72BFF.exe
    "C:\Users\Admin\AppData\Local\Temp\24F72BFF.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dll

    Filesize

    8.4MB

    MD5

    8b6c94bbdbfb213e94a5dcb4fac28ce3

    SHA1

    b56102ca4f03556f387f8b30e2b404efabe0cb65

    SHA256

    982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53

    SHA512

    9d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a

  • C:\Users\Admin\AppData\Roaming\166.exe

    Filesize

    800B

    MD5

    bbe5da97928bdb7c7d900f488eced36f

    SHA1

    507811bea28288b06f696e037bcd95ecd8765aca

    SHA256

    baa6b71f0d931daa2f69dbda7bbd1873b1280b0516854e2d6ac36c3a6ad02fcb

    SHA512

    7256287d7f056caa3f657d74ff906d7cc5f08d355f822ee25974933ae218b32efd307d7a45fbcd83a76048442bbead2da9daed68543c94e794b4f37c08e67359

  • C:\Users\Admin\AppData\Roaming\167.exe

    Filesize

    800B

    MD5

    6159daf7e336b73d2d72b5233cab5140

    SHA1

    891c89033ae172072a5b9bc6da5b450f6f3f8d4a

    SHA256

    da9b8a8c1c56b6bcacf63e42f9562527b2b10c77037436d8e59338a6935eafa9

    SHA512

    54c5e923c91dab6f19ea1825480b0a5c79e0455fb1928fcd124c4a78e2cd0193327b205cd5b85529a7dd95ba310bc8ac3c9ced726db7fb58ceaac0397166dc36

  • C:\Users\Admin\AppData\Roaming\168.exe

    Filesize

    800B

    MD5

    5ee08c496857ac48290d3ecb1d299e87

    SHA1

    c7d6b63ca6699d247455f44144f448a51dd6d1a2

    SHA256

    e83fdcb6ef10aa4b809cafa59318075cdf5bce2103ce0c879430c5b7e992254f

    SHA512

    9ff1fc216c3a892bdc5dcd053771963ac904d430638e9f9aaef84234e85e16bb0aa861ba012ff65409f82865abd961ab5ea81732595f38e4b76999ae0f9b28e7

  • C:\Users\Admin\AppData\Roaming\files.exe

    Filesize

    800B

    MD5

    ceb23378470bc434db5aaa42de47a050

    SHA1

    cc25c3ba6849cd9e2634546a549a824a0338c1c0

    SHA256

    e99ad5189226afaf1eb1b209a338fd28199bfb2d69bf29b53bf63733ba6b5b97

    SHA512

    d40c5888fd62ecd91d0e5054aef5ab16ed7086ebd3cc24cef8b16d2d242ef36a04a945636a7bb8fd99b373535d1f574b9990c8db65b7ee21c4e2e287029cb033

  • memory/4548-138-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/4548-151-0x00000000041E0000-0x00000000041EB000-memory.dmp

    Filesize

    44KB

  • memory/4548-140-0x0000000003960000-0x0000000003964000-memory.dmp

    Filesize

    16KB

  • memory/4548-141-0x0000000000B30000-0x0000000000B31000-memory.dmp

    Filesize

    4KB

  • memory/4548-142-0x0000000001080000-0x00000000010DF000-memory.dmp

    Filesize

    380KB

  • memory/4548-143-0x0000000002A90000-0x0000000002A91000-memory.dmp

    Filesize

    4KB

  • memory/4548-144-0x0000000003970000-0x0000000003974000-memory.dmp

    Filesize

    16KB

  • memory/4548-133-0x0000000000400000-0x0000000000A43000-memory.dmp

    Filesize

    6.3MB

  • memory/4548-150-0x00000000041E0000-0x00000000041EB000-memory.dmp

    Filesize

    44KB

  • memory/4548-139-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

    Filesize

    4KB

  • memory/4548-137-0x0000000002A80000-0x0000000002A81000-memory.dmp

    Filesize

    4KB

  • memory/4548-136-0x0000000002A40000-0x0000000002A41000-memory.dmp

    Filesize

    4KB

  • memory/4548-135-0x0000000002A50000-0x0000000002A51000-memory.dmp

    Filesize

    4KB

  • memory/4548-134-0x0000000000400000-0x0000000000A43000-memory.dmp

    Filesize

    6.3MB

  • memory/4548-189-0x0000000000400000-0x0000000000A43000-memory.dmp

    Filesize

    6.3MB

  • memory/4548-191-0x0000000001080000-0x00000000010DF000-memory.dmp

    Filesize

    380KB

  • memory/4548-192-0x0000000000400000-0x0000000000A43000-memory.dmp

    Filesize

    6.3MB

  • memory/4548-193-0x0000000001080000-0x00000000010DF000-memory.dmp

    Filesize

    380KB