Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:17

General

  • Target

    664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe

  • Size

    957KB

  • MD5

    da23352a594c97e931832f1ece7e3b1e

  • SHA1

    8eeb6854088d07502578b467ad716c39d985f7b6

  • SHA256

    664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4

  • SHA512

    77de8c75004aae778baf63f83b6d54ae1772d80139653ae79ed67d828319589c8b73a7ade7e255356635701ffbaaf9f17df4900864df17ac94b945400ac9e901

  • SSDEEP

    24576:ey1Fu2uC2q1c8V5tHIGvLk/y2FI/IjC9RS4lvbG9bi2:t1BfX1v5tHfv462uFqLi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe
    "C:\Users\Admin\AppData\Local\Temp\664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1357206.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1357206.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6653951.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6653951.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8082293.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8082293.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1284
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2096
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 268
                7⤵
                • Program crash
                PID:2700
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1357206.exe

    Filesize

    855KB

    MD5

    b2ae320a7af8a505b20d79308d8dcf7a

    SHA1

    10f3deb279abd75e13a072c9a4f044344fc78828

    SHA256

    845b627d6647f896f4cc4e6b7dd1b9c1bb6fa795692f6a35dfd9c191b2e5491e

    SHA512

    48be35a1c3048a9cb766496bd7872ed1b2317376bf3d7ced4e88955f2a95ef189d7ec793e4060afed6075f9c0edae27a076c46418125724d2f1e77f9d2845236

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1357206.exe

    Filesize

    855KB

    MD5

    b2ae320a7af8a505b20d79308d8dcf7a

    SHA1

    10f3deb279abd75e13a072c9a4f044344fc78828

    SHA256

    845b627d6647f896f4cc4e6b7dd1b9c1bb6fa795692f6a35dfd9c191b2e5491e

    SHA512

    48be35a1c3048a9cb766496bd7872ed1b2317376bf3d7ced4e88955f2a95ef189d7ec793e4060afed6075f9c0edae27a076c46418125724d2f1e77f9d2845236

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6653951.exe

    Filesize

    581KB

    MD5

    86739bb8edd55281ab0f027d59b60035

    SHA1

    facb1a5e17a1a29a56e0a828ca3b57af5bfa9476

    SHA256

    00d91f79dd4685a0936b59082d467c742cb647004aff1b7e71fad59aaa47a406

    SHA512

    0bdb49ce02514707a9da47adb33b4252a8f44641e08ced15d813e6ea606abdeeedd34e4e23927685eca5b98b6d9b90ca894c39be502f7dbfec8208cd10311f5e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6653951.exe

    Filesize

    581KB

    MD5

    86739bb8edd55281ab0f027d59b60035

    SHA1

    facb1a5e17a1a29a56e0a828ca3b57af5bfa9476

    SHA256

    00d91f79dd4685a0936b59082d467c742cb647004aff1b7e71fad59aaa47a406

    SHA512

    0bdb49ce02514707a9da47adb33b4252a8f44641e08ced15d813e6ea606abdeeedd34e4e23927685eca5b98b6d9b90ca894c39be502f7dbfec8208cd10311f5e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8082293.exe

    Filesize

    404KB

    MD5

    836cb0c5835876a80cb5de835e85538c

    SHA1

    2e7c3d8c421ffaf74b9b02b372f60da44e742790

    SHA256

    edd0b30dec5361c2407e1b038afd51330bb4e2080fde30a42b0ce115710f47cc

    SHA512

    9eafdd0d718a1dfc89cb686a83c2ca09624b832d9a1c5fef039955eaf6f692eaac432c2b8fe367c8253e6599b13e95490010e055ba760076f4577a1ee836ecc3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8082293.exe

    Filesize

    404KB

    MD5

    836cb0c5835876a80cb5de835e85538c

    SHA1

    2e7c3d8c421ffaf74b9b02b372f60da44e742790

    SHA256

    edd0b30dec5361c2407e1b038afd51330bb4e2080fde30a42b0ce115710f47cc

    SHA512

    9eafdd0d718a1dfc89cb686a83c2ca09624b832d9a1c5fef039955eaf6f692eaac432c2b8fe367c8253e6599b13e95490010e055ba760076f4577a1ee836ecc3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1357206.exe

    Filesize

    855KB

    MD5

    b2ae320a7af8a505b20d79308d8dcf7a

    SHA1

    10f3deb279abd75e13a072c9a4f044344fc78828

    SHA256

    845b627d6647f896f4cc4e6b7dd1b9c1bb6fa795692f6a35dfd9c191b2e5491e

    SHA512

    48be35a1c3048a9cb766496bd7872ed1b2317376bf3d7ced4e88955f2a95ef189d7ec793e4060afed6075f9c0edae27a076c46418125724d2f1e77f9d2845236

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1357206.exe

    Filesize

    855KB

    MD5

    b2ae320a7af8a505b20d79308d8dcf7a

    SHA1

    10f3deb279abd75e13a072c9a4f044344fc78828

    SHA256

    845b627d6647f896f4cc4e6b7dd1b9c1bb6fa795692f6a35dfd9c191b2e5491e

    SHA512

    48be35a1c3048a9cb766496bd7872ed1b2317376bf3d7ced4e88955f2a95ef189d7ec793e4060afed6075f9c0edae27a076c46418125724d2f1e77f9d2845236

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6653951.exe

    Filesize

    581KB

    MD5

    86739bb8edd55281ab0f027d59b60035

    SHA1

    facb1a5e17a1a29a56e0a828ca3b57af5bfa9476

    SHA256

    00d91f79dd4685a0936b59082d467c742cb647004aff1b7e71fad59aaa47a406

    SHA512

    0bdb49ce02514707a9da47adb33b4252a8f44641e08ced15d813e6ea606abdeeedd34e4e23927685eca5b98b6d9b90ca894c39be502f7dbfec8208cd10311f5e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6653951.exe

    Filesize

    581KB

    MD5

    86739bb8edd55281ab0f027d59b60035

    SHA1

    facb1a5e17a1a29a56e0a828ca3b57af5bfa9476

    SHA256

    00d91f79dd4685a0936b59082d467c742cb647004aff1b7e71fad59aaa47a406

    SHA512

    0bdb49ce02514707a9da47adb33b4252a8f44641e08ced15d813e6ea606abdeeedd34e4e23927685eca5b98b6d9b90ca894c39be502f7dbfec8208cd10311f5e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8082293.exe

    Filesize

    404KB

    MD5

    836cb0c5835876a80cb5de835e85538c

    SHA1

    2e7c3d8c421ffaf74b9b02b372f60da44e742790

    SHA256

    edd0b30dec5361c2407e1b038afd51330bb4e2080fde30a42b0ce115710f47cc

    SHA512

    9eafdd0d718a1dfc89cb686a83c2ca09624b832d9a1c5fef039955eaf6f692eaac432c2b8fe367c8253e6599b13e95490010e055ba760076f4577a1ee836ecc3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x8082293.exe

    Filesize

    404KB

    MD5

    836cb0c5835876a80cb5de835e85538c

    SHA1

    2e7c3d8c421ffaf74b9b02b372f60da44e742790

    SHA256

    edd0b30dec5361c2407e1b038afd51330bb4e2080fde30a42b0ce115710f47cc

    SHA512

    9eafdd0d718a1dfc89cb686a83c2ca09624b832d9a1c5fef039955eaf6f692eaac432c2b8fe367c8253e6599b13e95490010e055ba760076f4577a1ee836ecc3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe

    Filesize

    396KB

    MD5

    9258e8dc2792027ac93e44fb5514ddb5

    SHA1

    b8d174874ef836316919c60873036c8573220295

    SHA256

    23a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081

    SHA512

    574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae

  • memory/2096-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2096-47-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-43-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-50-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-52-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-54-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-48-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-46-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-45-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2096-44-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB