Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 17:12

General

  • Target

    07b5d94c90c0b3dbe0698722064f164e.exe

  • Size

    1.2MB

  • MD5

    07b5d94c90c0b3dbe0698722064f164e

  • SHA1

    bb35af6668e398d49d3c3218ace6a82a9a5869c6

  • SHA256

    f3c6a57a0b2cc4fbe00aa6dbb0180ee10ed9b714396fed50ee3d90d23e365796

  • SHA512

    be01d92a5431b1e8d3fac2f1fdde76adc675f583e7e02b331163a17df3728802d1702e7fc2fd8834c77897fa8d24ab72754829557fd75546d4c7dbfa3bb93694

  • SSDEEP

    24576:GM4drlMd+kVyB8dgtPJ3Q8JJugrTYhaexG1JQIqrnXte3/XG98GDV1yW8S:ry3kVU8dMPBQ6THYhaegTPq43/W9Z51t

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 6 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07b5d94c90c0b3dbe0698722064f164e.exe
    "C:\Users\Admin\AppData\Local\Temp\07b5d94c90c0b3dbe0698722064f164e.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab6858.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar688A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\nsi3DEB.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nsi3DEB.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

  • \Users\Admin\AppData\Local\Temp\nsi3DEB.tmp\nsArray.dll

    Filesize

    6KB

    MD5

    82d49c227928741f6f09c5cea3bde9f1

    SHA1

    b0904368a5e94026d0ca5760d4577236f796051d

    SHA256

    8bc5e75bbfa5a8f10526aec2af441153b2883d6d288726ed8f7c9af12a1ee02b

    SHA512

    d4f588e3613886e3dab58330cd69ce7f24c39be2c4854cc8edfcef98e1324926fcde0d79df1a8fdf5e2bf9327b17f22a9fa1396568c0ace4e46d4f548fdc7530

  • \Users\Admin\AppData\Local\Temp\nsi3DEB.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    ab73c0c2a23f913eabdc4cb24b75cbad

    SHA1

    6569d2863d54c88dcf57c843fc310f6d9571a41e

    SHA256

    3d0060c5c9400a487dbefe4ac132dd96b07d3a4ba3badab46a7410a667c93457

    SHA512

    99d287b5152944f64edc7ce8f3ebcd294699e54a5b42ac7a88e27dff8a68278a5429f4d299802ee7ddbe290f1e3b6a372a5f3bb4ecb1a3c32e384bca3ccdb2b8

  • \Users\Admin\AppData\Local\Temp\nsi3DEB.tmp\xml.dll

    Filesize

    118KB

    MD5

    42df1fbaa87567adf2b4050805a1a545

    SHA1

    b892a6efbb39b7144248e0c0d79e53da474a9373

    SHA256

    e900fcb9d598643eb0ee3e4005da925e73e70dbaa010edc4473e99ea0638b845

    SHA512

    4537d408e2f54d07b018907c787da6c7340f909a1789416de33d090055eda8918f338d8571bc3b438dd89e5e03e0ded70c86702666f12adb98523a91cbb1de1d

  • memory/2596-69-0x00000000005D0000-0x00000000005F1000-memory.dmp

    Filesize

    132KB

  • memory/2596-79-0x0000000074C30000-0x0000000074C3A000-memory.dmp

    Filesize

    40KB