Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    183s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:32

General

  • Target

    4369c6f7756bf6337b4488c3ff405817.exe

  • Size

    232KB

  • MD5

    4369c6f7756bf6337b4488c3ff405817

  • SHA1

    255dcffacc5ea214254be1e8b20b01c38f70fa67

  • SHA256

    35f0fc1a75dff7b1c8a3c8e22fd50c449f8ce9585a1d7c4114db140480db59a1

  • SHA512

    a24aa2c0ffa048e112d3f33a2cc93f23ffc7431d859f51125283a36a1d800430ba326d2380f6e73a5bb52a973d5e324a5c71a5db1d7ab34bca17becbbb44fab9

  • SSDEEP

    3072:prurB6QdzaxMGwBcQlUt0gGFItJZLVagt7q67DXP59wE2bpfV:prurB6QdzeMGwBRw9GbmzEn/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4369c6f7756bf6337b4488c3ff405817.exe
    "C:\Users\Admin\AppData\Local\Temp\4369c6f7756bf6337b4488c3ff405817.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\mooqu.exe
      "C:\Users\Admin\mooqu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\mooqu.exe

    Filesize

    109KB

    MD5

    13ff833a3eeab31a2f5c336d88d420f6

    SHA1

    132ea5b783a7c68741e6f79ebb26c3b83d44799f

    SHA256

    a4518adc5d69d24f2775546382192dde0b45b270b53c661864b421e446d99683

    SHA512

    976f2aa1d09cd8f3f7d87a074f167ebf59fd7337d9e16885a14aaa6deb90b5a2c106de4910eb7101dc02d1b50e6f5a2a4b91d891c4a28dda73198362b23bf2e6

  • C:\Users\Admin\mooqu.exe

    Filesize

    35KB

    MD5

    d5a50d68429be012e50a641269463f94

    SHA1

    4f2f9eafd5c632420bd0d77dd2561ad5d2634b80

    SHA256

    13053ee0d96364ca92ed580e248f48fea321418c4b01acc7ea8bbe2a6bf615c8

    SHA512

    9687c572606bdcf00695e9dd2610b5fe3687c8661fd2b5a993fb208ed1968140d24ee3798656c259fac9f0a06c2da3169bdafdb36056bae479d113d4f0c4a250

  • C:\Users\Admin\mooqu.exe

    Filesize

    26KB

    MD5

    d3918a8257088ee15ce04d5c9614a258

    SHA1

    346e909a7cdb9d976ab1c351044689a18c99c575

    SHA256

    7c8031d99bfd85414dd6e186dd6b10d952e9b85de2bcf69685c9af0518a1fb60

    SHA512

    c39fdf79f914e7952b0c514f4244b3df68c3b4ad38a19e60d41d20e4caf7d4de3fa50e5087fccd9d89b58b3a0ce600c8d802da2d93cccbe7e9a5134e9d8f45d7

  • \Users\Admin\mooqu.exe

    Filesize

    1KB

    MD5

    d8fa5715a7c51ffb3fc1a45bac64ffc8

    SHA1

    62236b9fea55a8b6a5dbc8d2398126a27915e547

    SHA256

    ac9732918611db14bc75871d5056f2581169049fe72abc7adc98734fd77154a7

    SHA512

    8de0dc634881cadb8574504996ec94f3b668b5ec638c3b8c2f7926e0497a7942e893c2626b4088ac8aa8d4b5ccbde7892d83de0231c8999457b8b573bd84903d

  • \Users\Admin\mooqu.exe

    Filesize

    42KB

    MD5

    dbbfd0a63571338ed5d0d308edda5061

    SHA1

    bfa6ca5407b7375e6c26c81ea55b9ae61e91af6f

    SHA256

    375c83d915d2fcee9be0747a0cb1ce404db1e51256015234a555afd14c741941

    SHA512

    f9cf2308216a22e671179d29eb74ceb839f20b117b094742304dbb3742a17a0577510b7b531701717ce66e8b4eb0f8dfe6c9b72915898ef1a9be59615098143b