Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 20:04

General

  • Target

    0fa2c32060eebf4377b7c812bcd06e2c.exe

  • Size

    49KB

  • MD5

    0fa2c32060eebf4377b7c812bcd06e2c

  • SHA1

    77b38d635963bd065fe8f4db5339fe15b47846a7

  • SHA256

    8dce833d9f135bc5d381217bd8e7390464bd18032214d8427186db7a505cf5c0

  • SHA512

    299e8535e591d5ffc7fa22d475f80a383c2d03d3de11ab1b5d34a39890c0754a4de5c0d43ef6cb4ad2eddc15b13426346fbbb371784b667c617c133c9b290f58

  • SSDEEP

    768:mCau1g2Jb8lFDKcQFWGYjcHvYO52OGnuh//HwT0+rYl2SjD943HGWX:mCau1TWflGjAO56e5uHh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\SysWOW64\svchost.exe
    svchost.exe
    1⤵
      PID:2324
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\2228227.bat
      1⤵
      • Deletes itself
      PID:2296
    • C:\Users\Admin\AppData\Local\Temp\0fa2c32060eebf4377b7c812bcd06e2c.exe
      "C:\Users\Admin\AppData\Local\Temp\0fa2c32060eebf4377b7c812bcd06e2c.exe"
      1⤵
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2300

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2228227.bat

      Filesize

      235B

      MD5

      a3c67672b5f7762c573b080d89e7a15e

      SHA1

      fefae36e93348cbc917d790d16b1dad58962db95

      SHA256

      7a75ddea6727a4400178f38a73e1ff9e94f5df2e259c808c327b64dfd5a3adac

      SHA512

      89224344097bad4baf9c6ae542ca5120597aefef92384ed935430b8f9128bea449a0671b63426e9c295e0b8d0f2e965019a957c1bdc5b124ea8586ff53c8a79d

    • memory/2324-12-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2324-4-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2324-3-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2324-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2324-14-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB