Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 08:04 UTC

General

  • Target

    16ef00d2fe56c1cdd323747d36b37a0f123322593ea531a134d9e6caca1ca4f3.exe

  • Size

    1.6MB

  • MD5

    4ed174686355e1a88707a33281af5b0e

  • SHA1

    d67f323b79079bd9e7629ca3d4fe887ba32491fa

  • SHA256

    16ef00d2fe56c1cdd323747d36b37a0f123322593ea531a134d9e6caca1ca4f3

  • SHA512

    b2c483128ff40e966003aaa0eb82a00bd1ab1c330a567f644ca777d5a6efaeeec416c5af656cc49347ecef167e26a3e700aa42d99adc28497129db5a88db4b7d

  • SSDEEP

    49152:acbz6GKTAQ4g9sPl7WPnFpokHZo4rEmVEpoDlPscA:acbfKTAtDPl7WPFpoCZo4rEaEpoDhsH

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16ef00d2fe56c1cdd323747d36b37a0f123322593ea531a134d9e6caca1ca4f3.exe
    "C:\Users\Admin\AppData\Local\Temp\16ef00d2fe56c1cdd323747d36b37a0f123322593ea531a134d9e6caca1ca4f3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" .\MhCLH.GwD -U -s
      2⤵
      • Loads dropped DLL
      PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MhCLH.GwD

    Filesize

    1.5MB

    MD5

    95bd632a54a5063b292ee00516bf5b34

    SHA1

    949a016734f140565ba3250251107af19c4290ba

    SHA256

    dc70146f71381677b712da071dda56614069fc5c1504b3b73b0ee40fdd3ad93d

    SHA512

    f4d2ee8cbe9cff6a4c9eda84db449b7409ccc416b89402d3459c76e2851b592fbb80a2f6a87aadce53cbadca1469951ee9a37e3673e7687235996476006e04ed

  • \Users\Admin\AppData\Local\Temp\MhCLh.GwD

    Filesize

    1.5MB

    MD5

    95bd632a54a5063b292ee00516bf5b34

    SHA1

    949a016734f140565ba3250251107af19c4290ba

    SHA256

    dc70146f71381677b712da071dda56614069fc5c1504b3b73b0ee40fdd3ad93d

    SHA512

    f4d2ee8cbe9cff6a4c9eda84db449b7409ccc416b89402d3459c76e2851b592fbb80a2f6a87aadce53cbadca1469951ee9a37e3673e7687235996476006e04ed

  • memory/1676-4-0x00000000001B0000-0x00000000001B6000-memory.dmp

    Filesize

    24KB

  • memory/1676-5-0x0000000010000000-0x0000000010181000-memory.dmp

    Filesize

    1.5MB

  • memory/1676-8-0x0000000002180000-0x0000000002287000-memory.dmp

    Filesize

    1.0MB

  • memory/1676-9-0x0000000002290000-0x000000000237B000-memory.dmp

    Filesize

    940KB

  • memory/1676-12-0x0000000002290000-0x000000000237B000-memory.dmp

    Filesize

    940KB

  • memory/1676-13-0x0000000002290000-0x000000000237B000-memory.dmp

    Filesize

    940KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.