Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/10/2023, 23:42

General

  • Target

    505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe

  • Size

    1.9MB

  • MD5

    4424913873574c384b1ce8230f6ed023

  • SHA1

    83dadd4fa95618daadc6519a1086fed1111f4dcf

  • SHA256

    505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50

  • SHA512

    681663a27d7da245acc70b7326a485ba2f49d9854da1f8c0156bf89e9229c800697ffe2df34503b15495567896623a1d84f9d241b5ff02184cd885761e3f847c

  • SSDEEP

    49152:UJGiK4arZV+ytURiNG1V6gHG29P3Xvz4v2/zLP9pvDS08:UIiK/z1ti1V6gHG29P3/z4v2/XPz8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe
    "C:\Users\Admin\AppData\Local\Temp\505187c078bfed283af86657268bbfac9cb015ff73173e9e067fd14677759d50.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c .\T.CMd
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4328
      • C:\Windows\SysWOW64\control.exe
        coNTRol.exE "C:\Users\Admin\AppData\Local\Temp\7zSC3268497\IZDGXGWI.l"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1200
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zSC3268497\IZDGXGWI.l"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:5036
          • C:\Windows\system32\RunDll32.exe
            C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zSC3268497\IZDGXGWI.l"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1276
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zSC3268497\IZDGXGWI.l"
              6⤵
              • Loads dropped DLL
              PID:4496

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSC3268497\IZDGXGWI.l

    Filesize

    1.8MB

    MD5

    612952c42fa396bc67eae65e6f42fd96

    SHA1

    5cf76e0671932548445b44ef9f4590421f126518

    SHA256

    70af95b6b8eb3e2e1581b1afbd7264d70ce7136f0975c904afdcb637a7aadc38

    SHA512

    e717d716381d75df76d9b494a85ccfc7bec392c05a17daf74db236689a83d80dc064f47001e3b84de923e02b2451dae19f71439ae6a03a19ce552279f89bc357

  • C:\Users\Admin\AppData\Local\Temp\7zSC3268497\T.cmd

    Filesize

    34B

    MD5

    e437d84fe3f456dce6fe930667c05391

    SHA1

    cdad5a27869958e61b6d3061fe1da009f50ce6c8

    SHA256

    d45f1d919fd4d3a968ee73a3a6ebf7fd86e90d3d17ce744678738f1552722dc5

    SHA512

    fb42ac951156becea1148f2153c31f72217dbdc7d428e4220c9f49e903c4b71d575ba2613d65b3b88b6af6009a08724371680a4f84448a934249b681f60866d0

  • \Users\Admin\AppData\Local\Temp\7zSC3268497\iZDGXGWi.l

    Filesize

    1.8MB

    MD5

    612952c42fa396bc67eae65e6f42fd96

    SHA1

    5cf76e0671932548445b44ef9f4590421f126518

    SHA256

    70af95b6b8eb3e2e1581b1afbd7264d70ce7136f0975c904afdcb637a7aadc38

    SHA512

    e717d716381d75df76d9b494a85ccfc7bec392c05a17daf74db236689a83d80dc064f47001e3b84de923e02b2451dae19f71439ae6a03a19ce552279f89bc357

  • \Users\Admin\AppData\Local\Temp\7zSC3268497\iZDGXGWi.l

    Filesize

    1.8MB

    MD5

    612952c42fa396bc67eae65e6f42fd96

    SHA1

    5cf76e0671932548445b44ef9f4590421f126518

    SHA256

    70af95b6b8eb3e2e1581b1afbd7264d70ce7136f0975c904afdcb637a7aadc38

    SHA512

    e717d716381d75df76d9b494a85ccfc7bec392c05a17daf74db236689a83d80dc064f47001e3b84de923e02b2451dae19f71439ae6a03a19ce552279f89bc357

  • memory/4496-28-0x00000000047D0000-0x00000000048B3000-memory.dmp

    Filesize

    908KB

  • memory/4496-27-0x00000000047D0000-0x00000000048B3000-memory.dmp

    Filesize

    908KB

  • memory/4496-25-0x00000000047D0000-0x00000000048B3000-memory.dmp

    Filesize

    908KB

  • memory/4496-23-0x00000000012A0000-0x000000000139C000-memory.dmp

    Filesize

    1008KB

  • memory/4496-19-0x0000000000B50000-0x0000000000B56000-memory.dmp

    Filesize

    24KB

  • memory/5036-9-0x0000000010000000-0x00000000101D4000-memory.dmp

    Filesize

    1.8MB

  • memory/5036-17-0x00000000050D0000-0x00000000051B3000-memory.dmp

    Filesize

    908KB

  • memory/5036-16-0x00000000050D0000-0x00000000051B3000-memory.dmp

    Filesize

    908KB

  • memory/5036-14-0x00000000050D0000-0x00000000051B3000-memory.dmp

    Filesize

    908KB

  • memory/5036-13-0x00000000050D0000-0x00000000051B3000-memory.dmp

    Filesize

    908KB

  • memory/5036-12-0x0000000004FD0000-0x00000000050CC000-memory.dmp

    Filesize

    1008KB

  • memory/5036-8-0x0000000001390000-0x0000000001396000-memory.dmp

    Filesize

    24KB