Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    31s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 08:17

General

  • Target

    5f1aeb632c888b0e4f29e0bb514c4e83.exe

  • Size

    142KB

  • MD5

    5f1aeb632c888b0e4f29e0bb514c4e83

  • SHA1

    f63feb63cff7cbea447dc83de302a61e7840922a

  • SHA256

    426f76f5a77d7967b3ed13065f560d4dc44179c68456df2af7a1afaf95fb7108

  • SHA512

    40d8fc5d4b07add580362400ac6cb63871de78aea4135f5dc66a76ec4a9864ce6a9f921d6effb554012a79aab293d0022a95a0c5b0c5dab7924d04e3cc039832

  • SSDEEP

    3072:ynOn7t7XpdpCCTg/sxFgJKeqgKJ+BCGCfZo4mlrBAdtf3Ht9:yKpdcCrTdgKTfaJjAzD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f1aeb632c888b0e4f29e0bb514c4e83.exe
    "C:\Users\Admin\AppData\Local\Temp\5f1aeb632c888b0e4f29e0bb514c4e83.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Users\Admin\AppData\Local\Temp\nsfEB3D.tmp\downloadmr.exe
      C:\Users\Admin\AppData\Local\Temp\nsfEB3D.tmp\downloadmr.exe /u4e820da5-3514-4c8f-ba03-600d5bc06f2f /e1948714
      2⤵
      • Executes dropped EXE
      PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsfEB3D.tmp\System.dll

    Filesize

    21KB

    MD5

    5ebc73650256e9c8ddbcda231db829a1

    SHA1

    988d4535e18754ab2a6248abae96c5697d7dbcd5

    SHA256

    1eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493

    SHA512

    b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270

  • memory/2612-13-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/2612-14-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/2612-15-0x0000000001280000-0x0000000001290000-memory.dmp

    Filesize

    64KB

  • memory/2612-17-0x0000000001280000-0x0000000001290000-memory.dmp

    Filesize

    64KB

  • memory/2612-16-0x0000000001280000-0x0000000001290000-memory.dmp

    Filesize

    64KB

  • memory/2612-18-0x0000000001280000-0x0000000001290000-memory.dmp

    Filesize

    64KB

  • memory/2612-20-0x00000000744D0000-0x0000000074A81000-memory.dmp

    Filesize

    5.7MB

  • memory/4752-24-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB