Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 20:26

General

  • Target

    10d0201de1a8bd609600f89c1f4e5dc5.exe

  • Size

    4.7MB

  • MD5

    10d0201de1a8bd609600f89c1f4e5dc5

  • SHA1

    0a3b35295bb8880ce0e6d18c649b8d29219eedf9

  • SHA256

    69c2b26b30c6ba2d05b2e6c1f3d9c9655d5538cf8e7358d068abf6c6229fc8da

  • SHA512

    7c1a76545704557edc604b6d3e02bdafbb401e4de1796df15e41f78a7ce1c9ec14164f855a8d515be6d3bf43a7eec0d2e78a8aa7cd98d02173f39d5ba006bf8a

  • SSDEEP

    98304:e2a6lJo8LvZQkOIV5ZCJiJrsZ6biwvQ/RYgcf/pjVWTYZECWUcEnU:RlLjZgIVc6bqRgCSfWEU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10d0201de1a8bd609600f89c1f4e5dc5.exe
    "C:\Users\Admin\AppData\Local\Temp\10d0201de1a8bd609600f89c1f4e5dc5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\is-JFG4B.tmp\10d0201de1a8bd609600f89c1f4e5dc5.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-JFG4B.tmp\10d0201de1a8bd609600f89c1f4e5dc5.tmp" /SL5="$500F8,4423017,85504,C:\Users\Admin\AppData\Local\Temp\10d0201de1a8bd609600f89c1f4e5dc5.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-81M3J.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-81M3J.tmp\itdownload.dll

    Filesize

    200KB

    MD5

    d82a429efd885ca0f324dd92afb6b7b8

    SHA1

    86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

    SHA256

    b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

    SHA512

    5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

  • \Users\Admin\AppData\Local\Temp\is-JFG4B.tmp\10d0201de1a8bd609600f89c1f4e5dc5.tmp

    Filesize

    1.1MB

    MD5

    76395a5fe6fb2d8d09987924a603212c

    SHA1

    b5952c2d3b80fa265b1312e47fc72e1427edb357

    SHA256

    44474fc13166b54bc018b4cdb0c649552189b7a2d4584f4b68ab226af436a241

    SHA512

    05b93d7735bd124407812e414906a345bacbc0b5327215eadbf45288835487de9e34292141e28970a6f27ea941ba947bba696b7e3b68af32d0c5068cf7269d7f

  • memory/1748-7-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1748-16-0x0000000000550000-0x000000000058C000-memory.dmp

    Filesize

    240KB

  • memory/1748-19-0x0000000000400000-0x0000000000522000-memory.dmp

    Filesize

    1.1MB

  • memory/1748-20-0x0000000000550000-0x000000000058C000-memory.dmp

    Filesize

    240KB

  • memory/1748-24-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1748-30-0x0000000000550000-0x000000000058C000-memory.dmp

    Filesize

    240KB

  • memory/2848-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2848-18-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB