Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 21:06

General

  • Target

    04043c750a9267ccef6cd0c8b69b96ea.exe

  • Size

    10.2MB

  • MD5

    04043c750a9267ccef6cd0c8b69b96ea

  • SHA1

    0ef115cec00d390468214a05dba1a631a735cbba

  • SHA256

    f7160ebb437ee6a8084b0adf40792a005630c2f832d32ba3629e9897b671952f

  • SHA512

    b976bba09f356b28b516e00dc5b4560970463dc665f7609e3f95a2b16dbaaea2d0e62a64de6b7570c1fe7b31f4ff1c28dd9d38fff93f3b03ada72c063fbb97c0

  • SSDEEP

    98304:l5aazeP2lhtE730g2yOEjjs9/g3U66kCsXfgZZqYmbID30g2yOEjjs9/g3:LaaphlZUju/JHxliZUju/

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04043c750a9267ccef6cd0c8b69b96ea.exe
    "C:\Users\Admin\AppData\Local\Temp\04043c750a9267ccef6cd0c8b69b96ea.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\04043c750a9267ccef6cd0c8b69b96ea.exe
      C:\Users\Admin\AppData\Local\Temp\04043c750a9267ccef6cd0c8b69b96ea.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\04043c750a9267ccef6cd0c8b69b96ea.exe

    Filesize

    1.4MB

    MD5

    458dc8cb4acbbcb098a7caee7846f31e

    SHA1

    896e1ca37f961ee2d0c63bb6088764ae003a41b8

    SHA256

    9ff00dd35c805483bab800a3207b099a09ff65f632600e445479c427bb2ae8b3

    SHA512

    79dc4e579b7d91f4e5d9cabbd831b991ca169dd061b36a302de2e8711dfbc32594ccc8a1e8c8287d76010925bd4bc1ea5c6a392a673599d046b112c2f8c3eeaa

  • \Users\Admin\AppData\Local\Temp\04043c750a9267ccef6cd0c8b69b96ea.exe

    Filesize

    925KB

    MD5

    f7ed94a15f59cc52ae74d2cee1bf1f69

    SHA1

    4bd3e94539a0b5390d8093c6bf4477ad3ea25132

    SHA256

    bc9d372d9f78397ab75fa99ddd6a487ebaf6ca8c4ab8faca0b2c37124ba53b2d

    SHA512

    56b42c57a8989b3d41420b0bf261a289035e8176d1447bd0acb7d64c9036f961f98602b7145647572445d995cce2355ff63471ace850db72c0cadad47dcf7858

  • memory/3012-1-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3012-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-3-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/3012-15-0x0000000004AA0000-0x000000000543E000-memory.dmp

    Filesize

    9.6MB

  • memory/3012-14-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/3068-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/3068-21-0x0000000002230000-0x000000000248A000-memory.dmp

    Filesize

    2.4MB

  • memory/3068-43-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB