Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 06:49

General

  • Target

    4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe

  • Size

    1.0MB

  • MD5

    55ef1e5fe8a3967f3e63185b55755b6d

  • SHA1

    1371600fa4621f25003d0b4bc57519849d6dea2f

  • SHA256

    4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d

  • SHA512

    fb34a2f44332d6cac21e6c905bb13e6372fcced8f382f0ddd52cf89a720b837a630e9190bb1df0b35b2a64f28ef805acd125ad1e369f69f378df22796a13350f

  • SSDEEP

    24576:yyv3i+VoE7b6Zo61kUvOu6U2SzX7BzKBtntR6ms4u:Z/Db6v2u6UDzX7BzKBd6mv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe
    "C:\Users\Admin\AppData\Local\Temp\4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1898414.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1898414.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0956643.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0956643.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7021876.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7021876.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1840
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 268
                7⤵
                • Program crash
                PID:848
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1898414.exe

    Filesize

    933KB

    MD5

    79016b2a53b9ae1215a177ad6061f802

    SHA1

    88cb9717b3e1f1c4b746ff8489ba701bc05882ac

    SHA256

    55b1dda23bf3b7e334383e2d48b7ad648d0f4288d8fdb9c0c2080ec467ec6b0b

    SHA512

    de28bfa568c6f49aa06a781c0a8d0785097330f300d752fcd7d6a1f6a639a1c5a4b7aa69bcded8120a0e289a8d38bcb60802aa94f5bf88a32f434176f46cf8cf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1898414.exe

    Filesize

    933KB

    MD5

    79016b2a53b9ae1215a177ad6061f802

    SHA1

    88cb9717b3e1f1c4b746ff8489ba701bc05882ac

    SHA256

    55b1dda23bf3b7e334383e2d48b7ad648d0f4288d8fdb9c0c2080ec467ec6b0b

    SHA512

    de28bfa568c6f49aa06a781c0a8d0785097330f300d752fcd7d6a1f6a639a1c5a4b7aa69bcded8120a0e289a8d38bcb60802aa94f5bf88a32f434176f46cf8cf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0956643.exe

    Filesize

    629KB

    MD5

    565395f07f19df260b379e8e065cc91a

    SHA1

    aec272568efa37036177ded8da75204bd5054a37

    SHA256

    8c2026711969d63484d5e4e8dd461c7cf51db05f8db875cf78055f5a5a14f774

    SHA512

    45510b3a76e741d96f4e5d859acaccdb5aa2fe4cfa1201710e172de777de3b912a1c9e38dc2b874bc3b565b957c5308a96ad464af5db302e634a5aa0adf0000b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0956643.exe

    Filesize

    629KB

    MD5

    565395f07f19df260b379e8e065cc91a

    SHA1

    aec272568efa37036177ded8da75204bd5054a37

    SHA256

    8c2026711969d63484d5e4e8dd461c7cf51db05f8db875cf78055f5a5a14f774

    SHA512

    45510b3a76e741d96f4e5d859acaccdb5aa2fe4cfa1201710e172de777de3b912a1c9e38dc2b874bc3b565b957c5308a96ad464af5db302e634a5aa0adf0000b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7021876.exe

    Filesize

    443KB

    MD5

    a07eb72f1c9c79c42cfe6ea8ea1bc9b0

    SHA1

    3ba1abc92cdf56e9018547666a526fab3db68ad2

    SHA256

    0a7380d6cb7ab6c4dcd876572aba662d80f95695abd7c7fcae9b87269cc38bbc

    SHA512

    d36d3825b40fa80a9d79c2e36a52998805299c98b2194615f232e3506606623039a9ea84be29ec561850eeee3354d392c361a19afa7a51afffe8baf1a7120942

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7021876.exe

    Filesize

    443KB

    MD5

    a07eb72f1c9c79c42cfe6ea8ea1bc9b0

    SHA1

    3ba1abc92cdf56e9018547666a526fab3db68ad2

    SHA256

    0a7380d6cb7ab6c4dcd876572aba662d80f95695abd7c7fcae9b87269cc38bbc

    SHA512

    d36d3825b40fa80a9d79c2e36a52998805299c98b2194615f232e3506606623039a9ea84be29ec561850eeee3354d392c361a19afa7a51afffe8baf1a7120942

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1898414.exe

    Filesize

    933KB

    MD5

    79016b2a53b9ae1215a177ad6061f802

    SHA1

    88cb9717b3e1f1c4b746ff8489ba701bc05882ac

    SHA256

    55b1dda23bf3b7e334383e2d48b7ad648d0f4288d8fdb9c0c2080ec467ec6b0b

    SHA512

    de28bfa568c6f49aa06a781c0a8d0785097330f300d752fcd7d6a1f6a639a1c5a4b7aa69bcded8120a0e289a8d38bcb60802aa94f5bf88a32f434176f46cf8cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1898414.exe

    Filesize

    933KB

    MD5

    79016b2a53b9ae1215a177ad6061f802

    SHA1

    88cb9717b3e1f1c4b746ff8489ba701bc05882ac

    SHA256

    55b1dda23bf3b7e334383e2d48b7ad648d0f4288d8fdb9c0c2080ec467ec6b0b

    SHA512

    de28bfa568c6f49aa06a781c0a8d0785097330f300d752fcd7d6a1f6a639a1c5a4b7aa69bcded8120a0e289a8d38bcb60802aa94f5bf88a32f434176f46cf8cf

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x0956643.exe

    Filesize

    629KB

    MD5

    565395f07f19df260b379e8e065cc91a

    SHA1

    aec272568efa37036177ded8da75204bd5054a37

    SHA256

    8c2026711969d63484d5e4e8dd461c7cf51db05f8db875cf78055f5a5a14f774

    SHA512

    45510b3a76e741d96f4e5d859acaccdb5aa2fe4cfa1201710e172de777de3b912a1c9e38dc2b874bc3b565b957c5308a96ad464af5db302e634a5aa0adf0000b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x0956643.exe

    Filesize

    629KB

    MD5

    565395f07f19df260b379e8e065cc91a

    SHA1

    aec272568efa37036177ded8da75204bd5054a37

    SHA256

    8c2026711969d63484d5e4e8dd461c7cf51db05f8db875cf78055f5a5a14f774

    SHA512

    45510b3a76e741d96f4e5d859acaccdb5aa2fe4cfa1201710e172de777de3b912a1c9e38dc2b874bc3b565b957c5308a96ad464af5db302e634a5aa0adf0000b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x7021876.exe

    Filesize

    443KB

    MD5

    a07eb72f1c9c79c42cfe6ea8ea1bc9b0

    SHA1

    3ba1abc92cdf56e9018547666a526fab3db68ad2

    SHA256

    0a7380d6cb7ab6c4dcd876572aba662d80f95695abd7c7fcae9b87269cc38bbc

    SHA512

    d36d3825b40fa80a9d79c2e36a52998805299c98b2194615f232e3506606623039a9ea84be29ec561850eeee3354d392c361a19afa7a51afffe8baf1a7120942

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x7021876.exe

    Filesize

    443KB

    MD5

    a07eb72f1c9c79c42cfe6ea8ea1bc9b0

    SHA1

    3ba1abc92cdf56e9018547666a526fab3db68ad2

    SHA256

    0a7380d6cb7ab6c4dcd876572aba662d80f95695abd7c7fcae9b87269cc38bbc

    SHA512

    d36d3825b40fa80a9d79c2e36a52998805299c98b2194615f232e3506606623039a9ea84be29ec561850eeee3354d392c361a19afa7a51afffe8baf1a7120942

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe

    Filesize

    700KB

    MD5

    9b5f3d7a7907546a2bc40984cf3903bb

    SHA1

    b17d8252ee06f619d1065cfee9de27a27b722cd9

    SHA256

    5a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a

    SHA512

    c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9

  • memory/1840-46-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1840-48-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1840-44-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1840-50-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1840-52-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1840-54-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1840-47-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1840-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1840-45-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1840-43-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB