Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 01:05

General

  • Target

    INTERV~1.exe

  • Size

    393KB

  • MD5

    865bfe30edc6e6802536b5a0954a92e7

  • SHA1

    c302402e8c5a4fd65218884cbd653953a2367d27

  • SHA256

    7f5386e1ae6b9ff3b0557ab4c29231e53839e9be3701a5e803ab666ea3eea46a

  • SHA512

    97ed8970864f3d96ea7e19610c41496e354faaebd4e766f21412baad068cf19f09c9a32b00be51e12ed66b09156df8b173524952fcd5b9c095779dadfd91f490

  • SSDEEP

    6144:njbeiPYYzbsQl4zCO5me1CDSf1yDzaLWEZgwn2y1bbcvS5KMiGc+icm:nuSYYzbsQl4zJr1yDzc/gwN1nc65qc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INTERV~1.exe
    "C:\Users\Admin\AppData\Local\Temp\INTERV~1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\file.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\file.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 264
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\file.exe

    Filesize

    91KB

    MD5

    9ea2d09fa6839e0191a465aea0ecace2

    SHA1

    91991e5f330f567265448698c3cd3b667fa6e606

    SHA256

    84930ae7e2164cc9b321ea4fca5a447d6445aa92a7d1db51cc866dfd8024f031

    SHA512

    05dfbd00bb3b26b526c6870c015edbca79a5c8425bc28344aa5afaedd40921c169c4c1c325e0c82d9e80afe905a36dfeba61b833c44914c69d39e7a9b45171b6

  • memory/3048-13-0x0000000002270000-0x0000000002347000-memory.dmp

    Filesize

    860KB