Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    4s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 09:28

General

  • Target

    63d0f60e7abc14187bee4ede11aafc04.exe

  • Size

    3.3MB

  • MD5

    63d0f60e7abc14187bee4ede11aafc04

  • SHA1

    e972f08f09342631df1067f2ae52cbaf30d8204e

  • SHA256

    3cd4e793181ea3d22df64365b3f6960155a3987a09d92d78415245af904cfdbc

  • SHA512

    2da3e3235b67991cb9487b106d60f607f17b68c2ff693834f08998dd2a2b1ecab8da153f07f2e00eb7325864f249de1b857c044a192ac792a8a35df16cad0bb5

  • SSDEEP

    98304:558Q2UzpWVXJ4zlji+LPdFSv1pUfPGPydx:4Q2UzpBlj75Fy1pw0A

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63d0f60e7abc14187bee4ede11aafc04.exe
    "C:\Users\Admin\AppData\Local\Temp\63d0f60e7abc14187bee4ede11aafc04.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsw643A.tmp\tools.dll

    Filesize

    59KB

    MD5

    c3767b058eda5d5758b026d4d0b1d3af

    SHA1

    e08c44b3f6a361b624836f5331ddfe5d3ad64d50

    SHA256

    aa8b1955499a91c9b9422ed0f799e2fea1e68341e8fb8d771037c5549d538f7a

    SHA512

    455f77fed0a2952326dc394cb7ce8124cd507d1924af4b8a72a8ba47e0bd1c0b9c5db3c3dd2dbaaed5d2f90d3f43f1a96d2e808c215145a82712367b9444f8c3

  • C:\Users\Admin\AppData\Local\Temp\nsw643A.tmp\tools.dll

    Filesize

    77KB

    MD5

    39e5de3bf76ad10ff5c6581bae758836

    SHA1

    368caa6ea6e79515927fa4306135f2330c3aa9a5

    SHA256

    5295e2de7b7c1db4e52c5c4ec08505b8ab9fa92d82e2f9ae9717412be0b63e2a

    SHA512

    d4c6a6fe48541b505a9efb8cc774a6c3263708d1a16acac895ee3045b24b437c90b85c557dce19c32de6a49feb960da9230d8906a3fac6cc5d74794a72f4f71e

  • C:\Users\Admin\AppData\Local\Temp\nsw643A.tmp\tools.dll

    Filesize

    24KB

    MD5

    56fb854c21621865cc026c3f0c3d5bce

    SHA1

    4e178ead43a95f691e830d9fdd3553242ea10919

    SHA256

    81bea0249c4c158bc162e25ed5d5501771b8148ee6fb7d35b4dd0fe137e91c1d

    SHA512

    6eea7aa852543f95c3cd7ff694d27eece0c9871f9cebac581b904f167433ffd021afa2ef603278b29a9cae6b2c86bcee1ba5ec2131720d908794c0ac3cb1f027

  • C:\Users\Admin\AppData\Local\Temp\nsw643A.tmp\tools.dll

    Filesize

    236KB

    MD5

    e12f05661436f2974cf91b5fc76fb5f4

    SHA1

    5e0b7887950204713bef3da0018911279f2540ec

    SHA256

    1873de723938193f9f0877b08c160884b79503b6607598158ad99bd909189fdc

    SHA512

    61d42e055865dd98552b29dd69dc3d761bc7f77c1af108ad13b0b390059be5668657645258c0c08052a5fe1e9f6bdb018da136eb103b7335097487ec0de5d22d

  • memory/556-30-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-31-0x0000000073C70000-0x0000000074221000-memory.dmp

    Filesize

    5.7MB

  • memory/556-25-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-23-0x0000000073C70000-0x0000000074221000-memory.dmp

    Filesize

    5.7MB

  • memory/556-29-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-28-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-19-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-24-0x0000000073C70000-0x0000000074221000-memory.dmp

    Filesize

    5.7MB

  • memory/556-32-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-33-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-34-0x0000000073C70000-0x0000000074221000-memory.dmp

    Filesize

    5.7MB

  • memory/556-35-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-36-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-37-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-38-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB

  • memory/556-39-0x0000000003310000-0x0000000003320000-memory.dmp

    Filesize

    64KB