Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 02:31 UTC

General

  • Target

    001733a447ec623cc5892292cd6ee5c6.exe

  • Size

    385KB

  • MD5

    001733a447ec623cc5892292cd6ee5c6

  • SHA1

    d133445019863083a7faf57d395ea2d0e0af9589

  • SHA256

    7a8a084e841b0e5f376cdf9e7c7143ea1c08fd51d5327bcaa676e050ff647de8

  • SHA512

    9fe843f60663b0ff6bee82bd948e700b7c0bf9f5de9067304694b996356625d72aabf16dd0fe2ffb916e21a6e64f0840af32c15483da6113254d790211be90bd

  • SSDEEP

    6144:7TkGwNfyc3CSNxWuWKISDq8iNs71o+v8WtU+qD1ifHjyJk9eQftw7veV0B:7TSlyGr8u/FD36sDv8V+PvxQQ0xB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exe
    "C:\Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exe
      C:\Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1620

Network

  • flag-us
    DNS
    pastebin.com
    001733a447ec623cc5892292cd6ee5c6.exe
    Remote address:
    8.8.8.8:53
    Request
    pastebin.com
    IN A
    Response
    pastebin.com
    IN A
    104.20.68.143
    pastebin.com
    IN A
    172.67.34.170
    pastebin.com
    IN A
    104.20.67.143
  • flag-us
    GET
    https://pastebin.com/raw/ubFNTPjt
    001733a447ec623cc5892292cd6ee5c6.exe
    Remote address:
    104.20.68.143:443
    Request
    GET /raw/ubFNTPjt HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: pastebin.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Tue, 26 Dec 2023 14:12:38 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    x-frame-options: DENY
    x-frame-options: DENY
    x-content-type-options: nosniff
    x-content-type-options: nosniff
    x-xss-protection: 1;mode=block
    x-xss-protection: 1;mode=block
    cache-control: public, max-age=1801
    CF-Cache-Status: HIT
    Age: 43
    Server: cloudflare
    CF-RAY: 83b9eb7e0bab71ed-LHR
  • 104.20.68.143:443
    https://pastebin.com/raw/ubFNTPjt
    tls, http
    001733a447ec623cc5892292cd6ee5c6.exe
    939 B
    4.4kB
    10
    7

    HTTP Request

    GET https://pastebin.com/raw/ubFNTPjt

    HTTP Response

    404
  • 8.8.8.8:53
    pastebin.com
    dns
    001733a447ec623cc5892292cd6ee5c6.exe
    58 B
    106 B
    1
    1

    DNS Request

    pastebin.com

    DNS Response

    104.20.68.143
    172.67.34.170
    104.20.67.143

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exe

    Filesize

    57KB

    MD5

    2b1ef5a08c7926e46b95c545660260b7

    SHA1

    dd8d4b1b8bfa53f4f592bcea25e74f303157a2d0

    SHA256

    d6a3c34a4ed5badc9da72b1e2b7201d6573f530015598b2e107373fb3b63c8d2

    SHA512

    87ab3427f7af9b3985100ddbe94c49c08c32e5e00bc9c1e9a1a03f564a5551b65d1908af97ffe01470b555456b534a9b7d97237838d9425fccb14f32ad624196

  • C:\Users\Admin\AppData\Local\Temp\Cab9FBB.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9FFC.tmp

    Filesize

    91KB

    MD5

    62fb6771959d6b061ef7a4bee3459b89

    SHA1

    d918ff7bb088f92f5e93377fbd82de86afefbe95

    SHA256

    fd9f3da55ef6c09f3f3c9eb272e1477489887e98bd7835e4a0196b131f05a334

    SHA512

    6ae8d4b85c5bb6d7e368ee806000ce7570e6b80cf1433856d92f001263da8700b279f5f5da8c4aefc41cfe75c332935bae313b9e00edeb703629d2015a42b32d

  • \Users\Admin\AppData\Local\Temp\001733a447ec623cc5892292cd6ee5c6.exe

    Filesize

    92KB

    MD5

    999be5102b75784d5cd86af634b4aac1

    SHA1

    91ecef2b5aaba1d0124b544b87ac9927abbc2f96

    SHA256

    13c1c5d943c188d01fea85bb5d29a9568591b54b702c08d074f91c578c685a4d

    SHA512

    e72f4475edecbf57c2029ca8f4980243a3f2c5b37c3c58be009e6e1f35365ee50e7d8fd88e6299901a7539afcfaf6dd4f9a160e284fd925bb9285f7ab035bc02

  • memory/1620-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1620-19-0x0000000000220000-0x0000000000286000-memory.dmp

    Filesize

    408KB

  • memory/1620-27-0x0000000002BD0000-0x0000000002C2F000-memory.dmp

    Filesize

    380KB

  • memory/1620-76-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1620-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1620-81-0x00000000075E0000-0x000000000761C000-memory.dmp

    Filesize

    240KB

  • memory/1704-14-0x0000000002E90000-0x0000000002EF6000-memory.dmp

    Filesize

    408KB

  • memory/1704-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1704-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1704-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1704-2-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.