Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 22:17

General

  • Target

    151912f15eb2cd24ceece6b86b4cc5ed.exe

  • Size

    1.0MB

  • MD5

    151912f15eb2cd24ceece6b86b4cc5ed

  • SHA1

    82955ddf2b0f7cfb8cffac6cdb7b0331c60e7e62

  • SHA256

    baf8aea1d7a48f18f805c7844b250c2f0c5595f34e7c15ac076cda4a05a1c3b5

  • SHA512

    45936d1e917474efd3daecac4739bbd1f433418d1b7582a785d5ab3f8c67cb52e8864ad81041fab0b169e0d33e414a82f5152335e090aec5149bcdd87722df4d

  • SSDEEP

    24576:jGiiO5MkR74d6sWBgTfEg78P/aYxKctGB2xEso8hMiAw4op:uobR7MlTd8PzXte2isoCMiAw4A

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\151912f15eb2cd24ceece6b86b4cc5ed.exe
    "C:\Users\Admin\AppData\Local\Temp\151912f15eb2cd24ceece6b86b4cc5ed.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsd1BAD.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    0d0152760fd9457de1428bf906a1e4ad

    SHA1

    05230deced9421a0adfc29d449fbd3217f63cfff

    SHA256

    b44799188e62ea99e950031258be135d813d3b0238dd41f7a5bb9f295247842a

    SHA512

    6442775f18140b43e84b2fa017fe2f6a6c205b2de358eb5e5022a8c1bfc2503a071c39283f395fa4151d434343ce5d84fc4e65fa6e026a46a1fc93aae7609e80

  • \Users\Admin\AppData\Local\Temp\nsd1BAD.tmp\System.dll

    Filesize

    11KB

    MD5

    bc3f65870d0587f6f7a4090232ee44a0

    SHA1

    b026d717e7a4febc9d4a54772229d1054f92a0fa

    SHA256

    8d6d45caf932f0ae15657a9909ba168a9a4f85f8e4384dc8cc28685cc4df2b50

    SHA512

    94efe8ef1de201d0e5ee518dc071cf1c08b693467b934ea1160f74a0222cdcdb4f66efc454743980e5df41a5ae932daef6857f85298899a292eb08d75dfbd178

  • \Users\Admin\AppData\Local\Temp\nsd1BAD.tmp\__322bce84428d4b59bfa82b2ee0a7394a.dll

    Filesize

    293KB

    MD5

    6beda71938e68bf35b59788f2a8a0fe4

    SHA1

    b103cb98eb2863dccbd3fb94f66c8ed211c6e8d4

    SHA256

    268f68c7a721ae9b7b99343b1bcd6fc27a8498054cd52fbd4f2b2a6f19f2dcb5

    SHA512

    7d5c98208935eb72ea31bb3d7ccd02c1c407b75b024adf032f916adeb77d68062bc5057e09923bda1f25dc413680b305dec5c649c43fd7d622c335de6ef4bbe0

  • \Users\Admin\AppData\Local\Temp\nsd1BAD.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    d58a98e4bcf7537f15b054876e40defb

    SHA1

    f8757c8a73ec6e30c090bb6779a23284d3b6fc68

    SHA256

    5e1f7272ae579c22da610c0375351a0ceedc830fe2e769261cc4881cbf847814

    SHA512

    12aff5e506f901ded9147a2d3a3ebd0c42b344d6688ea53dca959d90094090d63e13f6b0c46372fe4fbae5d923c316e9cb1d56e993a38102e641e2ba7d96e9ec