Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2023, 06:26 UTC

General

  • Target

    9865456789TH.exe

  • Size

    598KB

  • MD5

    958cb95438ce3e87d4589459ad9f1dc1

  • SHA1

    428567998143c6a0fd8cce178335fef7c26078a4

  • SHA256

    94e024435cc8cafb2705bf98e9551feaa5d2ab426fcbcef9efde59fe9ccb9e53

  • SHA512

    54596923d98f5708165e37b1f0e4ccecb5d89cb1a9b2b985fdc9176bb010bf790c9426ed7844793246852d4bec3324a86e3d87d81508e40c60e505fc942148e8

  • SSDEEP

    12288:wY7Y+3xUeQyX7sfNSjTZZmel48MCaHg82TfsDKC7wYgJctv:wY7YWzwfNy8el4XA8SC7wYFN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9865456789TH.exe
    "C:\Users\Admin\AppData\Local\Temp\9865456789TH.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\vlfaghzaa.exe
      "C:\Users\Admin\AppData\Local\Temp\vlfaghzaa.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Users\Admin\AppData\Local\Temp\vlfaghzaa.exe
        "C:\Users\Admin\AppData\Local\Temp\vlfaghzaa.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dbqxwhbe.gzs

    Filesize

    682KB

    MD5

    69e1e1238920c650b5398afb5af3e844

    SHA1

    04d2165532b4b37ff897317a90b31c0833be35b7

    SHA256

    f97a2c8e33f2da28a02e1c2349716f8dea91edee3fcd16b4f9b2cda12d588cf4

    SHA512

    5df43fef3ef85125d036ff219fa02f6d97382c92260c9062783b67ba6c98f49a8afb7bb026d55cecbc9d9b93a3a255c35bf297d43ee58b27e004a10bebcfdd11

  • C:\Users\Admin\AppData\Local\Temp\vlfaghzaa.exe

    Filesize

    165KB

    MD5

    f32db1d909e9cf2c692f6586af892b6e

    SHA1

    9aa3f0f3acc59deea13f50f1d356f2db1d3dc079

    SHA256

    f1383737a2b449e57fffc5c922bea3d79a367b3ae76928b08506f1983bc061c9

    SHA512

    31cfcfaff95066cd5fe83baaef8bafb0cd64836cc252db766d680cb92f9fc191c3819a53bc17013d5f99d955a05ff2a6c741c1dd4ed362a563a981413e014162

  • C:\Users\Admin\AppData\Local\Temp\vlfaghzaa.exe

    Filesize

    165KB

    MD5

    f32db1d909e9cf2c692f6586af892b6e

    SHA1

    9aa3f0f3acc59deea13f50f1d356f2db1d3dc079

    SHA256

    f1383737a2b449e57fffc5c922bea3d79a367b3ae76928b08506f1983bc061c9

    SHA512

    31cfcfaff95066cd5fe83baaef8bafb0cd64836cc252db766d680cb92f9fc191c3819a53bc17013d5f99d955a05ff2a6c741c1dd4ed362a563a981413e014162

  • C:\Users\Admin\AppData\Local\Temp\vlfaghzaa.exe

    Filesize

    165KB

    MD5

    f32db1d909e9cf2c692f6586af892b6e

    SHA1

    9aa3f0f3acc59deea13f50f1d356f2db1d3dc079

    SHA256

    f1383737a2b449e57fffc5c922bea3d79a367b3ae76928b08506f1983bc061c9

    SHA512

    31cfcfaff95066cd5fe83baaef8bafb0cd64836cc252db766d680cb92f9fc191c3819a53bc17013d5f99d955a05ff2a6c741c1dd4ed362a563a981413e014162

  • \Users\Admin\AppData\Local\Temp\vlfaghzaa.exe

    Filesize

    165KB

    MD5

    f32db1d909e9cf2c692f6586af892b6e

    SHA1

    9aa3f0f3acc59deea13f50f1d356f2db1d3dc079

    SHA256

    f1383737a2b449e57fffc5c922bea3d79a367b3ae76928b08506f1983bc061c9

    SHA512

    31cfcfaff95066cd5fe83baaef8bafb0cd64836cc252db766d680cb92f9fc191c3819a53bc17013d5f99d955a05ff2a6c741c1dd4ed362a563a981413e014162

  • \Users\Admin\AppData\Local\Temp\vlfaghzaa.exe

    Filesize

    165KB

    MD5

    f32db1d909e9cf2c692f6586af892b6e

    SHA1

    9aa3f0f3acc59deea13f50f1d356f2db1d3dc079

    SHA256

    f1383737a2b449e57fffc5c922bea3d79a367b3ae76928b08506f1983bc061c9

    SHA512

    31cfcfaff95066cd5fe83baaef8bafb0cd64836cc252db766d680cb92f9fc191c3819a53bc17013d5f99d955a05ff2a6c741c1dd4ed362a563a981413e014162

  • memory/1460-6-0x00000000000F0000-0x00000000000F2000-memory.dmp

    Filesize

    8KB

  • memory/2304-10-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2304-14-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2304-18-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.