Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 02:36

General

  • Target

    eef7b8bf3ddd199f5f3b864dbd01922d16cc4b754d0635689088e73f9e6c0ed3.exe

  • Size

    203KB

  • MD5

    ca2a3f209be25a8ebb65bda3979d1ac7

  • SHA1

    d888b31a18e0dca50fdc7f878f864a6c1ec5d5fe

  • SHA256

    eef7b8bf3ddd199f5f3b864dbd01922d16cc4b754d0635689088e73f9e6c0ed3

  • SHA512

    f574324a7f58d6ffee5b02760ca6038e6567df991da67eba1780e06e8b2f893f3a7952ded57f842f9717ceaf55874d3bfa410846fa4e0c4ffa429382144855c8

  • SSDEEP

    6144:Dz1xOecgEnOxUwWz1w4mcH+dZvF4lBFusBQY:31seJzWz1l+LIp

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Blocklisted process makes network request 8 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eef7b8bf3ddd199f5f3b864dbd01922d16cc4b754d0635689088e73f9e6c0ed3.exe
    "C:\Users\Admin\AppData\Local\Temp\eef7b8bf3ddd199f5f3b864dbd01922d16cc4b754d0635689088e73f9e6c0ed3.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\SysWOW64\TRACERT.EXE
      "C:\Windows\SysWOW64\TRACERT.EXE"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 104
        3⤵
        • Program crash
        PID:2356
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\Robocopy.exe
        "C:\Windows\SysWOW64\Robocopy.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 148
          4⤵
          • Program crash
          PID:2628
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\EEF7B8~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\WindowSystemNewUpdate822.log

    Filesize

    5KB

    MD5

    176b1e27271c721dc3b98a28bac322bf

    SHA1

    dbdfb73bc93d419bee11ee4e156285a93d269866

    SHA256

    ef83b683c50af7d9e4dbde8649925646220cc9620eac49d78e150db08fe7f394

    SHA512

    78e3e9a47a97feb3049484cddc25b89edb7021bf5404c88ce10c853a8ef3b3e76204062506617b2603b5f1509960086253e41233748a0db9ff75dea7a702f66d

  • memory/2448-30-0x00000000009B0000-0x0000000000A47000-memory.dmp

    Filesize

    604KB

  • memory/2448-0-0x00000000009B0000-0x0000000000A47000-memory.dmp

    Filesize

    604KB

  • memory/2448-41-0x00000000009B0000-0x0000000000A47000-memory.dmp

    Filesize

    604KB

  • memory/2448-40-0x00000000009B0000-0x0000000000A47000-memory.dmp

    Filesize

    604KB

  • memory/2616-2-0x0000000000080000-0x00000000000E7000-memory.dmp

    Filesize

    412KB

  • memory/2616-3-0x0000000000080000-0x00000000000E7000-memory.dmp

    Filesize

    412KB

  • memory/2616-4-0x0000000000080000-0x00000000000E7000-memory.dmp

    Filesize

    412KB

  • memory/2616-6-0x0000000000080000-0x00000000000E7000-memory.dmp

    Filesize

    412KB

  • memory/2744-15-0x0000000000160000-0x000000000017B000-memory.dmp

    Filesize

    108KB

  • memory/2744-13-0x0000000000090000-0x00000000000F7000-memory.dmp

    Filesize

    412KB

  • memory/2744-18-0x0000000000160000-0x000000000017B000-memory.dmp

    Filesize

    108KB

  • memory/2744-19-0x0000000010000000-0x0000000010057000-memory.dmp

    Filesize

    348KB

  • memory/2744-48-0x0000000003700000-0x0000000003BEB000-memory.dmp

    Filesize

    4.9MB

  • memory/2744-58-0x00000000001D0000-0x0000000000208000-memory.dmp

    Filesize

    224KB

  • memory/2744-69-0x0000000002BF0000-0x0000000002C57000-memory.dmp

    Filesize

    412KB

  • memory/2744-17-0x0000000000160000-0x000000000017B000-memory.dmp

    Filesize

    108KB

  • memory/3004-88-0x0000000000080000-0x000000000009F000-memory.dmp

    Filesize

    124KB

  • memory/3004-102-0x0000000000080000-0x000000000009F000-memory.dmp

    Filesize

    124KB

  • memory/3004-104-0x0000000000080000-0x000000000009F000-memory.dmp

    Filesize

    124KB

  • memory/3004-114-0x0000000002600000-0x0000000002C04000-memory.dmp

    Filesize

    6.0MB

  • memory/3004-116-0x0000000002600000-0x0000000002C04000-memory.dmp

    Filesize

    6.0MB

  • memory/3004-118-0x0000000002600000-0x0000000002C04000-memory.dmp

    Filesize

    6.0MB

  • memory/3004-120-0x0000000002600000-0x0000000002C04000-memory.dmp

    Filesize

    6.0MB

  • memory/3004-91-0x0000000000080000-0x000000000009F000-memory.dmp

    Filesize

    124KB