Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 14:58

General

  • Target

    029f5c692ea8805fe7df56b5f7f58461.exe

  • Size

    878KB

  • MD5

    029f5c692ea8805fe7df56b5f7f58461

  • SHA1

    0438f1ffa6deb208da6077ea625be7f848c959e0

  • SHA256

    20ecaa40127c96f9b16a0a4f495f2c4cbd8996acf10f9c582e10ff3b1329da26

  • SHA512

    abf729666e3b5da05fd4205d91e3b099a8d469dcb40702e55b5ae6901fef1fe95719aba2e960aa8b395f3f05a5752e7d5f257aeebdd5a286ea55c915d7adf19e

  • SSDEEP

    24576:nlMLKmtvPyHu7Ctw8T4S7y9pNg4W7HM8kcN+2QHCdH:liKmHyOGt5Fp7s8hQo

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe
    "C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe
      "C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1416
      • C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe
        "C:\Users\Admin\AppData\Local\Temp\029f5c692ea8805fe7df56b5f7f58461.exe"
        3⤵
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\YMVcW86aSSA8zdtOHUo\extramod.dll

    Filesize

    73KB

    MD5

    d96f9d6cf32d58c2be08f2ae3154b410

    SHA1

    cf9c726e72b0ff787c27dca6b1c7885ca490892b

    SHA256

    f2edacb95fe66678d99a69524f10bdb3a35a66dbc107b7bb1a6c2209fdcddc9d

    SHA512

    74b0984b0537839081facf8a0656b14175e3fee9a7bc84732fe2b9d438e7cdca6bba804b15f29b9b88b2c3fc24e1e37162c031d77836ee1957d0850be5fbab84

  • C:\Users\Admin\AppData\Local\Temp\YMVcW86aSSA8zdtOHUo\loading_screen.dll

    Filesize

    5KB

    MD5

    44dac7f87bdf94d553f8d2cf073d605d

    SHA1

    21bf5d714b9fcab32ba40ff7d36e48c378b67a06

    SHA256

    0e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66

    SHA512

    92c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774

  • C:\Users\Admin\AppData\Local\Temp\YMVcW86aSSA8zdtOHUo\lua51.dll

    Filesize

    494KB

    MD5

    f0c59526f8186eadaf2171b8fd2967c1

    SHA1

    8ffbe3e03d8139b50b41931c7b3360a0eebdb5cb

    SHA256

    6e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6

    SHA512

    dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854

  • C:\Users\Admin\AppData\Local\Temp\YMVcW86aSSA8zdtOHUo\shared_library.dll

    Filesize

    200KB

    MD5

    5fcb430103c5ab1895d4977f50700119

    SHA1

    51431c26d64d4fcda76b738c03c8dcd3681b749b

    SHA256

    d9e583e71c6c73907417d1c9985af870a5328fd599166199ed04391dea76521e

    SHA512

    d7ed5239dd494990074f607ba7ff93ce3c45e8477aa583f46cc76ef2c9cbbd980297d1b1fdce2abbd715dc03afe337ecc65104c5e613bf6dbea660d0fb55eb98

  • memory/532-20-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/532-21-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/532-14-0x0000000000690000-0x00000000006C6000-memory.dmp

    Filesize

    216KB

  • memory/532-19-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/532-18-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/532-17-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/532-22-0x000000007FE30000-0x000000007FE40000-memory.dmp

    Filesize

    64KB

  • memory/532-7-0x0000000000670000-0x0000000000686000-memory.dmp

    Filesize

    88KB

  • memory/532-28-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB