Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:44

General

  • Target

    440feb17fc2cc307d8708ce6732152a4.exe

  • Size

    385KB

  • MD5

    440feb17fc2cc307d8708ce6732152a4

  • SHA1

    19b5a7881e07475dd7a5024991e5d1d8ac15fe71

  • SHA256

    7f4db985fb7c507710c3f027fb62f4f0fcf7f16089af53e2d6118c1960a1e5bc

  • SHA512

    a5a8abe3830a9261ba9b8aa1eeb6d86a03bb77be00726df653e07e4960492af9a71a2abd1fe0504c261b10aa422a0cab5d73ee920fc8140d5e598b52ebcb6afe

  • SSDEEP

    6144:GXgY/LUEMawhM12KxSdOU5BI+4CbnsUG9XZ9KMhfksii6jWfMaH0O62fxbB:J8QiJ9U5CbCbns51ZMMhX6KfMa9z9B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe
    "C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe
      C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe

    Filesize

    92KB

    MD5

    a8127a485f7963b0c40bd660b735b73c

    SHA1

    272bccf540c43b0895fab70b1d444b3bc6d8a970

    SHA256

    40e1c7e82651287220d66f553b8e64562eb2f9b4dd56101cfa9515292445e90d

    SHA512

    bd6ce85575cebbc88ba59cda08201d7e1547a3b43a32c17f99d7d67fcefd3b6fe71425b2bfcec5adae2bcb9c55b7511120fbb606e54fd13dd2a249144364e374

  • C:\Users\Admin\AppData\Local\Temp\Cab2ADA.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2AEC.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\440feb17fc2cc307d8708ce6732152a4.exe

    Filesize

    93KB

    MD5

    2daad87c2793927c2ab0c114cf308d0d

    SHA1

    6274441252a7bc6303d1737db2a5c5fefc1697a8

    SHA256

    1dc16ecdd24a09389a7c3bee2d2bb51297478a45a58d5422ab1630c280883875

    SHA512

    189f6c292724ce577191d9e896f717615672c775e732c97bb22bf0294467379655a3d49cc7d29b5216a149cf12c4d1da5683a13b1a695e4b27877dfc0a97530f

  • memory/2156-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2156-2-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/2156-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2156-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2156-12-0x00000000014E0000-0x0000000001546000-memory.dmp

    Filesize

    408KB

  • memory/2692-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2692-21-0x0000000000260000-0x00000000002C6000-memory.dmp

    Filesize

    408KB

  • memory/2692-24-0x0000000000330000-0x000000000038F000-memory.dmp

    Filesize

    380KB

  • memory/2692-82-0x0000000005580000-0x00000000055BC000-memory.dmp

    Filesize

    240KB

  • memory/2692-81-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2692-76-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2692-83-0x0000000005580000-0x00000000055BC000-memory.dmp

    Filesize

    240KB