Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 12:33

General

  • Target

    6edb93f13f3e7cc6cd399fec862f0f08.exe

  • Size

    874KB

  • MD5

    6edb93f13f3e7cc6cd399fec862f0f08

  • SHA1

    0414d9d771fd3ca75fb93c2fa3e52965305c8462

  • SHA256

    209879f885f5b681482ecbe8acb22b3f7dd33517d0670041f13500002cbe84dd

  • SHA512

    dc717a1a6c938d040a0209c6cd6f866b2c550968a29d71ca7e6a5b50f02d39557f4b6e7c8dc4bdf80f71100aba25a9aef7b5e1cc2e2fc9e10682e91e528c149c

  • SSDEEP

    24576:z+MLKmtvPyHu7h4SSy9pNg4W7HM8ScN+2QHCex:KiKmHyOop7s83QF

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6edb93f13f3e7cc6cd399fec862f0f08.exe
    "C:\Users\Admin\AppData\Local\Temp\6edb93f13f3e7cc6cd399fec862f0f08.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\6edb93f13f3e7cc6cd399fec862f0f08.exe
      "C:\Users\Admin\AppData\Local\Temp\6edb93f13f3e7cc6cd399fec862f0f08.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2180
  • C:\Users\Admin\AppData\Local\Temp\6edb93f13f3e7cc6cd399fec862f0f08.exe
    "C:\Users\Admin\AppData\Local\Temp\6edb93f13f3e7cc6cd399fec862f0f08.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lPeZQmlbkojSWzS31za\lua51.dll

    Filesize

    320KB

    MD5

    9bbd09d0cf3bad673d8716a7ada0b946

    SHA1

    56d97b6cfdf04a6dc77a81037c4c88341c326cb3

    SHA256

    f1bc9e1c5bc014027357d630599f6b74237f27f47112215ee1821da099479cb5

    SHA512

    cad177c1b8a1c426a21c059d6398f441b17eff9878beee7f7f3d73396265d63c946aa70dbaddaddb8c7974b8b8ec32c080540613df1b2135a02ed9bf4b367364

  • memory/2184-5-0x0000000000250000-0x0000000000266000-memory.dmp

    Filesize

    88KB

  • memory/2184-10-0x0000000000310000-0x0000000000346000-memory.dmp

    Filesize

    216KB

  • memory/2184-18-0x000000007EF90000-0x000000007EFA0000-memory.dmp

    Filesize

    64KB

  • memory/2184-19-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

    Filesize

    64KB

  • memory/2184-25-0x000000007EF00000-0x000000007EF10000-memory.dmp

    Filesize

    64KB

  • memory/2184-17-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

    Filesize

    64KB

  • memory/2184-16-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

    Filesize

    64KB

  • memory/2184-15-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

    Filesize

    64KB

  • memory/2184-14-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

    Filesize

    64KB

  • memory/2184-13-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

    Filesize

    64KB