Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 05:29

General

  • Target

    e444734f8f846c9730b7f82c8c10194a99b65808332a5e79d915a72bbc39918d.exe

  • Size

    1.0MB

  • MD5

    439fcdf0f6a214e219fed2b92553901b

  • SHA1

    b1983d9673d740dbbfc423a514848c6122e36cb4

  • SHA256

    e444734f8f846c9730b7f82c8c10194a99b65808332a5e79d915a72bbc39918d

  • SHA512

    b2474bd7309f981893cd72cfb71513963aece92ac402dc75f2c55068ac0810685a60906eb2102f72e3f3f9e26eae4ecced17dd8bb06c25b2e40db8dead2db667

  • SSDEEP

    24576:fyS1oBomKzYteyUO1H3QsmqjNcW+FEso82Y0WNF3Go/:qSWKzgP3PT+EsViWX2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e444734f8f846c9730b7f82c8c10194a99b65808332a5e79d915a72bbc39918d.exe
    "C:\Users\Admin\AppData\Local\Temp\e444734f8f846c9730b7f82c8c10194a99b65808332a5e79d915a72bbc39918d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1576986.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1576986.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6279041.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6279041.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5847399.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5847399.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2940
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2756
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 268
                7⤵
                • Program crash
                PID:2536
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1576986.exe

    Filesize

    932KB

    MD5

    a537b60577f41c0a99bd7debadf859ed

    SHA1

    f7bd3d1e416bedee76e075fa16d436ab1bf02095

    SHA256

    f44515abd1f50d8273e82b6d3c89f0af704184cb544d26844bee8d6422349cf9

    SHA512

    b4fa43380e5a2b6705d0b1f088b265c549a99fc31952266246ae7471c528fe60976caf1f83f6e6631b0d5a29a31732ba20641ebc45d67b82aafc5aae1ad53692

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1576986.exe

    Filesize

    932KB

    MD5

    a537b60577f41c0a99bd7debadf859ed

    SHA1

    f7bd3d1e416bedee76e075fa16d436ab1bf02095

    SHA256

    f44515abd1f50d8273e82b6d3c89f0af704184cb544d26844bee8d6422349cf9

    SHA512

    b4fa43380e5a2b6705d0b1f088b265c549a99fc31952266246ae7471c528fe60976caf1f83f6e6631b0d5a29a31732ba20641ebc45d67b82aafc5aae1ad53692

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6279041.exe

    Filesize

    628KB

    MD5

    0302efaa2745cb3e4cecfac917d1f2a3

    SHA1

    faa664606eff8e174eaed1c046d4ecb301433387

    SHA256

    408e13bbb1cc981365574bde1b39e30ccfb6f9339162aa2f15907bb37d69a0f2

    SHA512

    8b255420d53a3052b1955e49b346ea8efaa0e9ae84f6dd27db6fda91b80455c814c5f62c43a8ba450eacbbfabc3309d6fe42df9514659842a291e583ea1532cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6279041.exe

    Filesize

    628KB

    MD5

    0302efaa2745cb3e4cecfac917d1f2a3

    SHA1

    faa664606eff8e174eaed1c046d4ecb301433387

    SHA256

    408e13bbb1cc981365574bde1b39e30ccfb6f9339162aa2f15907bb37d69a0f2

    SHA512

    8b255420d53a3052b1955e49b346ea8efaa0e9ae84f6dd27db6fda91b80455c814c5f62c43a8ba450eacbbfabc3309d6fe42df9514659842a291e583ea1532cb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5847399.exe

    Filesize

    442KB

    MD5

    f2f05af674f28977b9d0c7bb66087b64

    SHA1

    250ecd2a98c5117e01a175856805a9655416a74c

    SHA256

    4e7876416098b0bcbcf841d6a2ebb393b3e3f52969600c27e650b3490534247a

    SHA512

    8bb2631295f16f3f7d3746e68bbbb6f0b0adb4de6983340e2cb416ae1dd96aa0dcd345d6803d54240c13622dd95c968f00c4ed934f943afae30aa277b636857a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5847399.exe

    Filesize

    442KB

    MD5

    f2f05af674f28977b9d0c7bb66087b64

    SHA1

    250ecd2a98c5117e01a175856805a9655416a74c

    SHA256

    4e7876416098b0bcbcf841d6a2ebb393b3e3f52969600c27e650b3490534247a

    SHA512

    8bb2631295f16f3f7d3746e68bbbb6f0b0adb4de6983340e2cb416ae1dd96aa0dcd345d6803d54240c13622dd95c968f00c4ed934f943afae30aa277b636857a

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1576986.exe

    Filesize

    932KB

    MD5

    a537b60577f41c0a99bd7debadf859ed

    SHA1

    f7bd3d1e416bedee76e075fa16d436ab1bf02095

    SHA256

    f44515abd1f50d8273e82b6d3c89f0af704184cb544d26844bee8d6422349cf9

    SHA512

    b4fa43380e5a2b6705d0b1f088b265c549a99fc31952266246ae7471c528fe60976caf1f83f6e6631b0d5a29a31732ba20641ebc45d67b82aafc5aae1ad53692

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1576986.exe

    Filesize

    932KB

    MD5

    a537b60577f41c0a99bd7debadf859ed

    SHA1

    f7bd3d1e416bedee76e075fa16d436ab1bf02095

    SHA256

    f44515abd1f50d8273e82b6d3c89f0af704184cb544d26844bee8d6422349cf9

    SHA512

    b4fa43380e5a2b6705d0b1f088b265c549a99fc31952266246ae7471c528fe60976caf1f83f6e6631b0d5a29a31732ba20641ebc45d67b82aafc5aae1ad53692

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6279041.exe

    Filesize

    628KB

    MD5

    0302efaa2745cb3e4cecfac917d1f2a3

    SHA1

    faa664606eff8e174eaed1c046d4ecb301433387

    SHA256

    408e13bbb1cc981365574bde1b39e30ccfb6f9339162aa2f15907bb37d69a0f2

    SHA512

    8b255420d53a3052b1955e49b346ea8efaa0e9ae84f6dd27db6fda91b80455c814c5f62c43a8ba450eacbbfabc3309d6fe42df9514659842a291e583ea1532cb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6279041.exe

    Filesize

    628KB

    MD5

    0302efaa2745cb3e4cecfac917d1f2a3

    SHA1

    faa664606eff8e174eaed1c046d4ecb301433387

    SHA256

    408e13bbb1cc981365574bde1b39e30ccfb6f9339162aa2f15907bb37d69a0f2

    SHA512

    8b255420d53a3052b1955e49b346ea8efaa0e9ae84f6dd27db6fda91b80455c814c5f62c43a8ba450eacbbfabc3309d6fe42df9514659842a291e583ea1532cb

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5847399.exe

    Filesize

    442KB

    MD5

    f2f05af674f28977b9d0c7bb66087b64

    SHA1

    250ecd2a98c5117e01a175856805a9655416a74c

    SHA256

    4e7876416098b0bcbcf841d6a2ebb393b3e3f52969600c27e650b3490534247a

    SHA512

    8bb2631295f16f3f7d3746e68bbbb6f0b0adb4de6983340e2cb416ae1dd96aa0dcd345d6803d54240c13622dd95c968f00c4ed934f943afae30aa277b636857a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5847399.exe

    Filesize

    442KB

    MD5

    f2f05af674f28977b9d0c7bb66087b64

    SHA1

    250ecd2a98c5117e01a175856805a9655416a74c

    SHA256

    4e7876416098b0bcbcf841d6a2ebb393b3e3f52969600c27e650b3490534247a

    SHA512

    8bb2631295f16f3f7d3746e68bbbb6f0b0adb4de6983340e2cb416ae1dd96aa0dcd345d6803d54240c13622dd95c968f00c4ed934f943afae30aa277b636857a

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g8098227.exe

    Filesize

    700KB

    MD5

    39f83f3772359387845a5289ca51a3d1

    SHA1

    916b0e47e7852662e812104d2135e4f610d86930

    SHA256

    f786083e89151afc355d2644f4daa9b0632c33ac91b3068c18c24479f745ce51

    SHA512

    828509d6c72593200141794b6150801ae988fe6198e632fac743ca3b6380c6059d4fd9f6e70fc2d75a89f59f255a0f929ffbaa778b09be166b073678e821a83d

  • memory/2756-46-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2756-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2756-48-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2756-50-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2756-52-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2756-54-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2756-47-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2756-45-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2756-44-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2756-43-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB