Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 09:26 UTC

General

  • Target

    14692a0407821da0b5e3fb9fcfdb0bd3.exe

  • Size

    209KB

  • MD5

    14692a0407821da0b5e3fb9fcfdb0bd3

  • SHA1

    7eee502d14a3f8a1b8a63ff6445d0196725da6a6

  • SHA256

    7a28638f9c7f527fb47c763ef1db3d81beddf29a5cd93ff77b2e6a5fdf0ac0ae

  • SHA512

    6cb6bd5b7b7b7117e71a8866265ffab558671824bed5cc872cb013672daa7aa1ea9493dd0e1b774251dd633c991c97a5915aea22c95ec589b2ed2383b2965d13

  • SSDEEP

    6144:8lsSFhz3fpYZTmV1Jb3YdquGhWXsO/P3gZjjhMSiwduCjn/fm8:bUhbpBd3gqUXsuWCx4/f

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14692a0407821da0b5e3fb9fcfdb0bd3.exe
    "C:\Users\Admin\AppData\Local\Temp\14692a0407821da0b5e3fb9fcfdb0bd3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7224.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save 14692a0407821da0b5e3fb9fcfdb0bd3.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Local\Temp\7407.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\7407.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe7408.tmp"
          4⤵
          • Executes dropped EXE
          PID:2612
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        PID:1900
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:3012

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7224.tmp\vir.bat

      Filesize

      1KB

      MD5

      c38988289f96edf1c560611377d7a99d

      SHA1

      a3a5ed7f46c97327392854be4109322f6b9e50d8

      SHA256

      7d8a589aa280d38483983a745fe7df51ed0c8bacb9309079d4209489fc5708f7

      SHA512

      b40c1e14c76d2e6d06afc354d3394a3b68ec8ee626be0d4c64ff5857b1459128e43bac77d19937413be3bf96cca7ae9cc6b5b981d1c21bc26773672d2bc206e7

    • C:\Users\Admin\AppData\Local\Temp\exe7408.tmp

      Filesize

      41KB

      MD5

      ebcc0f877b80fa4157b2f780c6863c50

      SHA1

      e9bc8f799887a43ef7445bf39124075a2baf1b3c

      SHA256

      9053aa322aa1443a79c4ef7b1447f92d05c9d3c023902ef4de3abaaccdc6df01

      SHA512

      7d000c34f9de9c41cef651f3e681f97b147a251de69ecbc3743e437f97ce10cc33d1f3d5fc45c10d1b75bac3de5b86ff8ae50bb629fafb34bbf0a4c5593aa945

    • C:\Users\Admin\AppData\Local\Temp\exe7408.tmp

      Filesize

      741KB

      MD5

      d019122cf6b255b3fa00163eba1f9023

      SHA1

      6d9ff19a46e0c20fc3972a39a25b19236de307c4

      SHA256

      743f6c6ce86c199b39d3ff0b484c66ebc9b9b69c970580de1d6ff07111337aac

      SHA512

      1167a8b5f90e9cf49bb52710eb1dc78bcae32091d2c6b60a88ae9bdf2bc045df1707f119f5fb6fd799f0a914f747412744129753c4578d351040fc2f68e71b62

    • C:\Users\Admin\AppData\Local\Temp\exe7408.tmp

      Filesize

      207KB

      MD5

      4ef5df4279d3bcb33a5710823e845c40

      SHA1

      aeab1e44c9735cee7c2356dc8284348710b75b1d

      SHA256

      8ec64c8bc9770a47b0c5ded390907cb5589188bfe012a81e4d573092bb158369

      SHA512

      dc0010d4e483350e16b497b0064749aa8e7e51e8c4886c2033e6f40af6dd9115691e12f35c335e8365c61696ff8a2bb683b8064332f4457ea69a51bc425802a9

    • C:\Users\Admin\AppData\Local\Temp\exe77DF.tmp

      Filesize

      41KB

      MD5

      bac68e690b1c14dba6029b68bf6485e0

      SHA1

      911ac3beb4e166a4fd3e263787175b257a8a2125

      SHA256

      45422da2885226ab32d568f8155b68c173675a7a5ca058f1e75feddc5229348d

      SHA512

      6ab4ded492eb5c594ba5a0da0eb0f6f812b459de500b9111264276e6eadaefd58e470abb2bebd4c044b689dddd08a919a947417f53d246e4547befc859f5d34a

    • C:\Users\Admin\AppData\Local\Temp\s.dll

      Filesize

      700KB

      MD5

      77ba6153827a203577b5d79c941e801c

      SHA1

      6deb4bdee67f4fb1a01ffa702e7941220c00f5a0

      SHA256

      7df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7

      SHA512

      65d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      400cea674fe8ebbab38e3890f88d0fb2

      SHA1

      636c3619c9edb07cb572ac67d8fe7b30314b2248

      SHA256

      537fc477a596d90faaacfb91435e7764ee38b91e68faaee298770bbb8aa84c4a

      SHA512

      3ee5e1abb239d0624cecb2fe0321b488adc1019dccc5d5d63345558f15ee2dac5533765fcc2271f612aade6adf2af8ddbc190f2418cd9f7e5dd5242b627f74ba

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      fb20c9a232876ae6676f4e60eba4f1e9

      SHA1

      7bef9cca9dff7cf3f28702acc22fd215b288bbfd

      SHA256

      e440b0a9997480e26d53a91ad3ded3aa1f8e3359f04e583dfe30a69ad497aa83

      SHA512

      49de1796caae45cabf07f942c85b6f724869a4e5c3d9bed259a9ac6465a190d1995eaf066e93e9cd9eb6115db0e705f6605661894bfd805a0df779271f83ad70

    • \Users\Admin\AppData\Local\Temp\7407.tmp\mpress.exe

      Filesize

      100KB

      MD5

      e42b81b9636152c78ba480c1c47d3c7f

      SHA1

      66a2fca3925428ee91ad9df5b76b90b34d28e0f8

      SHA256

      7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

      SHA512

      4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

    • memory/2184-0-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2184-112-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2612-69-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2612-74-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2740-68-0x0000000000660000-0x0000000000694000-memory.dmp

      Filesize

      208KB

    • memory/2740-66-0x0000000000660000-0x0000000000694000-memory.dmp

      Filesize

      208KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.