Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19/12/2023, 14:05

General

  • Target

    3db85be36123dc49e8d4211b94002089.exe

  • Size

    13KB

  • MD5

    3db85be36123dc49e8d4211b94002089

  • SHA1

    cf530b3ad4a48325b0691a449d8328bdbd2a3e1d

  • SHA256

    305c1fa5f9e983b3c30812d8b0a1249e69a5033f9e17b9670c0e9da122ec7b28

  • SHA512

    ac95251cf092df10311b9e0b6ecc17c13422e4e5052ca281daa8e261fdbff4ce6a52539b3f3817b2a9368949c503943bf814bc22ddcd340a8af6c2599b5d6ff9

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4Yh9c:hDXWipuE+K3/SSHgxHc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3db85be36123dc49e8d4211b94002089.exe
    "C:\Users\Admin\AppData\Local\Temp\3db85be36123dc49e8d4211b94002089.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\DEM140D.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM140D.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Users\Admin\AppData\Local\Temp\DEM696D.exe
        "C:\Users\Admin\AppData\Local\Temp\DEM696D.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Users\Admin\AppData\Local\Temp\DEMBF3A.exe
          "C:\Users\Admin\AppData\Local\Temp\DEMBF3A.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1716
          • C:\Users\Admin\AppData\Local\Temp\DEM146B.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM146B.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Users\Admin\AppData\Local\Temp\DEM69DA.exe
              "C:\Users\Admin\AppData\Local\Temp\DEM69DA.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2712
              • C:\Users\Admin\AppData\Local\Temp\DEMBF2A.exe
                "C:\Users\Admin\AppData\Local\Temp\DEMBF2A.exe"
                7⤵
                • Executes dropped EXE
                PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEM696D.exe

    Filesize

    13KB

    MD5

    557af6039c059f189b08cf46f755388d

    SHA1

    8a4e479f0680bef3950ffbb669eff0897f93b915

    SHA256

    51d7b74d47407733bc0245c1823d55e6913167d30cb2630323e689994c136b89

    SHA512

    6df4f0f9bd3b7e39bbb880a4b3062dcb4f3349d7964b2f15ee3b2880fc776f784d608868643258f62214ffb178e6ae33cd688281235dac984872830de8a584ba

  • C:\Users\Admin\AppData\Local\Temp\DEMBF2A.exe

    Filesize

    14KB

    MD5

    bdf6f85b8cd6b320f682bba946b60412

    SHA1

    6c174c33d7966bd213d12d7886fb777c717b8c2c

    SHA256

    8c8b1553d2828c27964c598e1d340c6c1bf79f0e0760f36fd1f96c16d8e40c73

    SHA512

    1f78c8089b19a19a7f99107d4d5585ebb1412d85db90d950cadd95172df6f70631461c60210b5684f69d96cbdd46eb3c3979ea45e4be9d0b8f7c04035e362572

  • \Users\Admin\AppData\Local\Temp\DEM140D.exe

    Filesize

    13KB

    MD5

    734e51c1eadee123a4885c2e6050a765

    SHA1

    8a161a34413f9cac664940a952d5537fa1362aa0

    SHA256

    e52e44529ce919570402645ee39df7e729b007c739d9762bdc0805ffef924056

    SHA512

    62afc30d6a92608a5d88d791ef9679eae2fe1b13abc11a5f7842ef67894557c5c880d92c283d5eeeb568cb7bde88aea240826eaaa3a43a925619f0485d462833

  • \Users\Admin\AppData\Local\Temp\DEM146B.exe

    Filesize

    13KB

    MD5

    19fa380fad45232546b96bf0c5c4330d

    SHA1

    2b1f601bf5f396c56225cebd87408670e4143ba0

    SHA256

    6fdf7f55d360cb7b0a65e6583f3cf85b0578a52da12478c412a2fcfadf6d2ff3

    SHA512

    4c1480fce32158e77f64a0cc385c762f9eb962818a2def42aad08327d3d984795a310ea9407b6386648080cde48dfed33a4dea672ed6b24c740b7f9577603a9a

  • \Users\Admin\AppData\Local\Temp\DEM69DA.exe

    Filesize

    14KB

    MD5

    c848df998e628c394f751986b0ee30aa

    SHA1

    552b6ea50d6a4a9d395628b364a70aa03410389f

    SHA256

    282f1221686a9a9652cad2c114eeab4bc728f0da1f857a0e687d432bfdf1e04a

    SHA512

    9bad22e5d205ac6925a237c9b5e83fc3558c559d4fbbbfcfc42ef24cb8dd119884b24215270946cbb309f16b2866d622e1a4bebb2069dc29e722f2eb176ddee2

  • \Users\Admin\AppData\Local\Temp\DEMBF3A.exe

    Filesize

    13KB

    MD5

    53a9aa50e8615790832d5c8c30b3a927

    SHA1

    411e6fd35d8819362dae25ad68f64dab364c54eb

    SHA256

    0ae0319f715bd44e3516f8715a03acc0cc99c934ad8e6b2141dc8e58a1074712

    SHA512

    ce8a471eb45a5aa993a7cea2541c632107374f9d86c2a2a71776e78861ddd4fbaae5c8a9ad229142ec37e70551a7d4f6ff492c8536ca9548e0449bf99c5071b7