Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 21:10

General

  • Target

    041446924f9462d185ce680cfe40b1cd.exe

  • Size

    711KB

  • MD5

    041446924f9462d185ce680cfe40b1cd

  • SHA1

    ab5d1b015016e8ebf1024ef30c9a1fc3300d8423

  • SHA256

    eecd0c3ecc0098784090692a619ddf39b75fb9dd5d9143722e62294096534948

  • SHA512

    fbc25524652d3deccb3f6fef6a7d3db55c3f71de3ddd0a6a3180a7917ad56d309ffc356327a5221e00d724b212185168e719f7af03aed55ec2378cefe45dfcc5

  • SSDEEP

    12288:hLshYUaIY8DeY4IqRZLRfaflAZlAD/xUNnCD/pTZFQP+bXStj0DQv63Ws6:hLWBY8SQqbFfamZaDZCsNG2bxi26

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\041446924f9462d185ce680cfe40b1cd.exe
    "C:\Users\Admin\AppData\Local\Temp\041446924f9462d185ce680cfe40b1cd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\SFS1777.tmp
      "C:\Users\Admin\AppData\Local\Temp\SFS1777.tmp"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2032
  • C:\Users\Admin\AppData\Local\Temp\SFS1796.tmp
    "C:\Users\Admin\AppData\Local\Temp\SFS1796.tmp"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Program Files (x86)\Invocation\readthis.txt
      2⤵
        PID:2680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\SFS1777.tmp

      Filesize

      691KB

      MD5

      96de23fddcb50155dcc6345f4c21a6db

      SHA1

      dd6762249dcaf8a82394c880eef25971ff260fc0

      SHA256

      bf2f2d497a8ae8a23dc99fbd17be02f5adc20d9682878e8e0811418bef80bfb0

      SHA512

      92f07ce42784cab4819cf1b833fbb3b6ab8ec0e206966efed5c3d29eb9f2ca364d413c3b357a108c2092de210aeb1704214f5bd21c0f0eaf3cec4dac33bc767f

    • C:\Users\Admin\AppData\Local\Temp\SFS1796.tmp

      Filesize

      95KB

      MD5

      efc0e2c0358fd80812030eaf6c1b7adb

      SHA1

      6af9ede88e867fc9d3a91548cdf4a6474183df6f

      SHA256

      1684e0b3cee7d52533f7e9e84bf4dbca08b5e240d159c02a13819df7b79b3379

      SHA512

      ef142af1a00826064d2b3eb0146c216dc2342aea4717149882e4d3666dd3c46d9a7657e4e1973f6112a3ff704d0c0a613a74ea42af0ffdbb3beb80f67cc26a5d

    • C:\Users\Admin\AppData\Local\Temp\SFS1796.tmp

      Filesize

      304KB

      MD5

      8bd27cc8bb87176f4a21cb27a741b28a

      SHA1

      d660d064d720744e4c8a3ba34308d6919117c6fd

      SHA256

      c21438ac0ed8d524f57124bdd394c06509f2595363c38580b92e8fe1ef81203a

      SHA512

      e8d374264deb5d953de9ebea3e6763199e5c0d10c1f58e58dd2b44e9b41866714042f4d38e0ca0d4b2f02e743ee90f4faead40382cef78e25947109e528d3316

    • \Program Files (x86)\Invocation\temple.EXE

      Filesize

      93KB

      MD5

      3a18618cd45a3cd128e5b9ead7a95e82

      SHA1

      5f8ce2031b714527a88428a4f712b20935a77715

      SHA256

      a7231712ed39b233c6c8b4c89038ccdd9e3164eb4e2867528793e50646d7eeda

      SHA512

      6f2b7cf66810904a11dee1a0a9493eae62590d82001c61a1a8292658827aa0d346836242754b4bc93ef260386cd1b09773ebeb888aa63e930d12f246f5d24400

    • \Users\Admin\AppData\Local\Temp\SFS1777.tmp

      Filesize

      470KB

      MD5

      ac6be11731a193ecf66ef13ec0810cad

      SHA1

      a7252bc84d0de7c28ba408030268f70acc32df79

      SHA256

      1eb63539a76d7e8bdb994c10f81d1ccbf2122c638aed1cf03a2b760a8e3feb55

      SHA512

      d2594da8ea452bb8107a6550894497e4cf3e47751610c39200470c71e93ec2600605a8788272de6e988770821400bd3e666a0a6d665cda0848602f54411c078b

    • \Users\Admin\AppData\Local\Temp\SFS1796.tmp

      Filesize

      381KB

      MD5

      29b98b170a75652257ea9bacd13de70a

      SHA1

      cc838ca111b0e43999b6e54ab4b4ff68c450b1f0

      SHA256

      79525d0ef65bb6453a2cc20c2bc83931af0dec9e3f1411842874d72c72055dd3

      SHA512

      b4a213b7b6e89b24fd660017641b42260f78e1ce070919313246b520ff92bcbc597f2c62a9bba619aa423ab3c84ebfd2ee271aaf5cb2f3838b1b27bbebd61c9f

    • \Users\Admin\AppData\Local\Temp\SFS1796.tmp

      Filesize

      71KB

      MD5

      bbaa39a7e5ddf9da25f1148f89a47c67

      SHA1

      9120facd0090add1f4525224e3a04d24ab81b4f6

      SHA256

      cb0a0a7b1ff1d492884739870be42caaad47b87b0c51a397efe27a6293751990

      SHA512

      fae603e5bde613571aa084082d7f8dba39ccffbd016c3da11403ea18f0e77428e465c5f77b22ed3febd31143c54affa61f93f83685a10a05f3875c77399699f8

    • memory/2844-35-0x0000000000B20000-0x0000000000B30000-memory.dmp

      Filesize

      64KB