Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

20/09/2023, 14:11

230920-rhnajsgf9z 6

16/09/2023, 04:09

230916-eqv9xagg7v 10

Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2023, 14:11

General

  • Target

    TeraBox_sl_b_1.23.0.9.exe

  • Size

    84.5MB

  • MD5

    7dcba44868b48ecdba2f73d433f169f7

  • SHA1

    932c96465b4a459477515e40dcb2f123e90b72dd

  • SHA256

    d7e7b2d54cb4cfa0796049e866e9a3a4ccf400c8492876c3085b8eb45c7d754f

  • SHA512

    1733612a6d8ebb85b8e6577ed8e4eeff7f512860ab42db886b46e3301bd7c29476c3433c8c831f63a095c894355a5722dca19f62ffcd84b46982c7fd845a2e7c

  • SSDEEP

    1572864:kTqOX2HZv0OLfmYwgDFNF69OfX5m1yysYnkLeInfMez:k258OLuYZDFv7f5NcgeEkez

Score
4/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeraBox_sl_b_1.23.0.9.exe
    "C:\Users\Admin\AppData\Local\Temp\TeraBox_sl_b_1.23.0.9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsi50D0.tmp\nsProcessW.dll

    Filesize

    4KB

    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • \Users\Admin\AppData\Local\Temp\nsi50D0.tmp\NsisInstallUI.dll

    Filesize

    2.1MB

    MD5

    714055df53d8869cfd459e28cf18152a

    SHA1

    e6680ed8c7eb67db0352c8c287af5011e7d8712f

    SHA256

    b2d3a17f8d5b092649eb1c1bd819fdbff00f16b29eb5af57072404fa0390ebf6

    SHA512

    0397a4d04ae00690a9c550a44ce1e5f1c71b8da72aafa325163d5055b55c5d49bec559c2098269c163b18eb5426a44b33f102ac8144c5bdaa74033b1e4748ea6

  • \Users\Admin\AppData\Local\Temp\nsi50D0.tmp\System.dll

    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • \Users\Admin\AppData\Local\Temp\nsi50D0.tmp\nsProcessW.dll

    Filesize

    4KB

    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • memory/2296-20-0x00000000038B0000-0x00000000038F0000-memory.dmp

    Filesize

    256KB

  • memory/2296-98-0x00000000038B0000-0x00000000038F0000-memory.dmp

    Filesize

    256KB