Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 13:42

General

  • Target

    aad7f0aabacb2f29410c0a9c3c752061.exe

  • Size

    133KB

  • MD5

    aad7f0aabacb2f29410c0a9c3c752061

  • SHA1

    72cb0c6100bb1b3c8bcd443785b3682c96cd9816

  • SHA256

    cbbad4d4d9b672078d1ff57e1ee1367d586d8b72f5fa69277c0f1c395b10f925

  • SHA512

    7c8ac9df47ef8de83aa91f6f571d4caa4a7dcce1249f2861ec013eaeb69745e627c1375b5c78516c5b82eab4a2d7d312811f9ee8ef1135ffa61ed80501b2265d

  • SSDEEP

    3072:9aGiqrAA6utVsWL921xGqKS4H1zJUKq+gk7SjZ1YQl27FW7wxQ:9ixADtVA1Es4g+57g1YuaqYQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aad7f0aabacb2f29410c0a9c3c752061.exe
    "C:\Users\Admin\AppData\Local\Temp\aad7f0aabacb2f29410c0a9c3c752061.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\aad7f0aabacb2f29410c0a9c3c752061.exe
      C:\Users\Admin\AppData\Local\Temp\aad7f0aabacb2f29410c0a9c3c752061.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aad7f0aabacb2f29410c0a9c3c752061.exe

    Filesize

    64KB

    MD5

    c6803bcbeb849dd23891c3c810a94cbc

    SHA1

    61ec339190ab62455fbd508d1ae1e46be0b226a9

    SHA256

    b512142847b19c3b7f08fb6b4d3e356334812b020f4f64feb0738385d4bfe7a7

    SHA512

    6f4e27ac684d1a6285493f131b9de53d5587b8bd42b537c5c4187f4af6e85d78cb6176d9b35d891cb1e0287845401c35c5d9f4072dfe431ab184a32ea4a89f0a

  • \Users\Admin\AppData\Local\Temp\aad7f0aabacb2f29410c0a9c3c752061.exe

    Filesize

    60KB

    MD5

    422d4b175fb794117e8aef1b0f87e915

    SHA1

    2ba8565c83ed2304f122c4bb7ae9770ef700798d

    SHA256

    330d09c1b2e24c5a285401aaa3f0c5f42b755114f4ad4761c6724793f1b96641

    SHA512

    c629a2a7a856444fe9b5c1678b9bb362d5a7ea1f97ab48eae35a253b8add515d1203d9c4bc59d1bf04abe14cb8ecb77bcecac441bb5f5124ae722107e299675c

  • memory/2428-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2428-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2428-1-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2428-15-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2460-16-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2460-18-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2460-42-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB