Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    38s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 23:03

General

  • Target

    0667751a4f57e8f0631885fd19922fd0.exe

  • Size

    907KB

  • MD5

    0667751a4f57e8f0631885fd19922fd0

  • SHA1

    c73d958eda8ade7830f5468dfcf5b783a6814b47

  • SHA256

    de6d5e81b045dc9594c9c55f00d58a519f6ad994def322ff60c986e4ce818570

  • SHA512

    2502384aeb9e93704b9ff3f69456266c0dff14737a476f9808dbe90e0a0893ce4971f2ee0a7341027c4fa2ad2c4b4c44b9e4d061014e4bc1a5f243619397047c

  • SSDEEP

    12288:FA2HVOHgzNvmhhLYOtJ4CmCAgEqAzVFekFwiI+ZjkeRjVDa/ZS1:d1SgJvmT7mfgEqAqkGaa/ZS1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0667751a4f57e8f0631885fd19922fd0.exe
    "C:\Users\Admin\AppData\Local\Temp\0667751a4f57e8f0631885fd19922fd0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\0667751a4f57e8f0631885fd19922fd0.exe
      C:\Users\Admin\AppData\Local\Temp\0667751a4f57e8f0631885fd19922fd0.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0667751a4f57e8f0631885fd19922fd0.exe

    Filesize

    82KB

    MD5

    7bf89d8f9dc3883f336db79160553669

    SHA1

    64656825d30894d0c44fe547356e58482e023ba1

    SHA256

    26a9d45a217bc165aec14219a0149f7cf579f36994838901b0ac5678a47cf139

    SHA512

    39c5e22b08000b198358941c696185cc75e72eeafe5c44a70a7250acd46ecded68c4fbba3eaa919ee4a8f6a53a7f7130375c7e827fe53e378a8c2b832f325168

  • C:\Users\Admin\AppData\Local\Temp\CabE7C2.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarE7F4.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Users\Admin\AppData\Local\Temp\0667751a4f57e8f0631885fd19922fd0.exe

    Filesize

    162KB

    MD5

    ccbc6faa6c068058c3288361d9427732

    SHA1

    43d723b998e72eba33aef06cda40dd85e97b3a9b

    SHA256

    3b8bc8fcc7b30d99c73bb688fc2792d1f3705de314cfcd0d3c6e410271474662

    SHA512

    7c273a162f110f9f9c9a3724a2c2e34677ae2fc624583e4eb7aa2975565fd05be3a0b16ecc08768d3d9172473c3788fb8258e97e4859d2339482b417fb8264a0

  • memory/2356-14-0x00000000031A0000-0x0000000003288000-memory.dmp

    Filesize

    928KB

  • memory/2356-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2356-13-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2356-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2356-2-0x00000000014F0000-0x00000000015D8000-memory.dmp

    Filesize

    928KB

  • memory/2688-16-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2688-18-0x00000000002D0000-0x00000000003B8000-memory.dmp

    Filesize

    928KB

  • memory/2688-25-0x0000000002F40000-0x0000000002FFB000-memory.dmp

    Filesize

    748KB

  • memory/2688-23-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2688-77-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2688-82-0x000000000ED40000-0x000000000EDD8000-memory.dmp

    Filesize

    608KB