Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 02:48

General

  • Target

    55d99984bbe39e60cda2f0fd3470d901.exe

  • Size

    10.2MB

  • MD5

    55d99984bbe39e60cda2f0fd3470d901

  • SHA1

    8eb3fdf9b1a9782c0656d99b854d09387947ca83

  • SHA256

    e52cf670f0e5c2e2d221338ac6b4af389d84426caf02672876f0e386fc83bf1a

  • SHA512

    9a37aa3254edda369043e8cb99d1bedcb6a11f4ab60716bff2d87ed4446a3dfbb880f2d733117e2c14d1dce25edde1b9a7efd31302c08bab96e492550afb27cf

  • SSDEEP

    98304:+I+YPRScl3hZiV52ul+WlIcwUCOIe31e7AXwYXyPJlS3hZiV52ul+WlIcwUCOIe3:+I+GdViTp+QCOZF3CPQiTp+QCO

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55d99984bbe39e60cda2f0fd3470d901.exe
    "C:\Users\Admin\AppData\Local\Temp\55d99984bbe39e60cda2f0fd3470d901.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\55d99984bbe39e60cda2f0fd3470d901.exe
      C:\Users\Admin\AppData\Local\Temp\55d99984bbe39e60cda2f0fd3470d901.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\55d99984bbe39e60cda2f0fd3470d901.exe

    Filesize

    137KB

    MD5

    e625f9ea63eaadf2618f7f9db9e80c77

    SHA1

    d1ebddf0efb6703e9aa889b81f0b79146e396790

    SHA256

    6e775d4c11365a3194d40c2d1c1caaede3ae5263127dab2bf6dc5351d0590ac5

    SHA512

    44f36bfd5ad2fa29fe6de49139263535ff90b72c5d40fb6e0c4e40c2abdb2f4f313f654c08198470e60e5e39df87b97f9af7d0a885cee8d8c0bd85c0568463e6

  • \Users\Admin\AppData\Local\Temp\55d99984bbe39e60cda2f0fd3470d901.exe

    Filesize

    154KB

    MD5

    c83741d686df7dc13fcfbb6102f265aa

    SHA1

    3fbc716b47a3ed28b1c4d64ee954d0981fc6a015

    SHA256

    af070342a7b1fad82a2e89e4f0e610a71c1c48fc54db8e8137736d70825ab5d8

    SHA512

    f733700d6baff2e5bd43dfb8b7c31c78491d13e2dfaed2a6d4e225811ed7821b639e5fb8915ac5ebe861154e5cbabe660ae96e3d1f95ea19ad6e197ab81cd396

  • memory/2372-19-0x00000000021D0000-0x000000000242A000-memory.dmp

    Filesize

    2.4MB

  • memory/2372-21-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2372-35-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2972-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2972-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2972-2-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2972-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2972-17-0x0000000004AA0000-0x000000000543E000-memory.dmp

    Filesize

    9.6MB

  • memory/2972-34-0x0000000004AA0000-0x000000000543E000-memory.dmp

    Filesize

    9.6MB