Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 23:30

General

  • Target

    06f985d32c61c1ef235df8516ff721ce.exe

  • Size

    1.2MB

  • MD5

    06f985d32c61c1ef235df8516ff721ce

  • SHA1

    5eec2a7b37f0c1d35977a1e8056c3c3595cce1fa

  • SHA256

    53a0902ac696cd93d9584d20a18bd430a05b29b3e0d0f235f98ff1422d21d2af

  • SHA512

    f36b03e12c3651ec18e789bf5af75376b0af72a0a47aef97647763f1c8fbf1c6bcd6e977eae6d043833f69ed16393dd16b4b59bca1305466e523bc77b6c955bb

  • SSDEEP

    24576:T0n12NHo+Pf+SJ7U4ujmBGPMsuK9q88Zay9FgJq/X:Tm26Afp7UpruKK/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\06f985d32c61c1ef235df8516ff721ce.exe
    "C:\Users\Admin\AppData\Local\Temp\06f985d32c61c1ef235df8516ff721ce.exe"
    1⤵
      PID:2656
      • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
        "C:\Users\Admin\AppData\Local\Temp\Crypted.exe"
        2⤵
          PID:2300
          • C:\Users\Admin\AppData\Local\Temp\Crypted.exe
            "C:\Users\Admin\AppData\Local\Temp\Crypted.exe"
            3⤵
              PID:2808
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              3⤵
                PID:2772
          • C:\Windows\SysWOW64\install\ophcrack.exe
            "C:\Windows\system32\install\ophcrack.exe"
            1⤵
              PID:2368

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2300-16-0x0000000024010000-0x0000000024072000-memory.dmp

              Filesize

              392KB

            • memory/2656-0-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

              Filesize

              9.6MB

            • memory/2656-1-0x0000000002010000-0x0000000002090000-memory.dmp

              Filesize

              512KB

            • memory/2656-3-0x0000000002010000-0x0000000002090000-memory.dmp

              Filesize

              512KB

            • memory/2656-2-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

              Filesize

              9.6MB

            • memory/2656-11-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

              Filesize

              9.6MB

            • memory/2808-34-0x00000000003C0000-0x00000000003C1000-memory.dmp

              Filesize

              4KB

            • memory/2808-313-0x0000000024080000-0x00000000240E2000-memory.dmp

              Filesize

              392KB

            • memory/2808-27-0x00000000001D0000-0x00000000001D1000-memory.dmp

              Filesize

              4KB

            • memory/2808-21-0x00000000001B0000-0x00000000001B1000-memory.dmp

              Filesize

              4KB

            • memory/2808-1562-0x0000000024080000-0x00000000240E2000-memory.dmp

              Filesize

              392KB