Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 02:18

General

  • Target

    0b6676091b74c9af31d4449ed02c9c63.exe

  • Size

    385KB

  • MD5

    0b6676091b74c9af31d4449ed02c9c63

  • SHA1

    a1ad07902fcad2fd40a5138ce0c34ba9dc1621b3

  • SHA256

    5050a8512c5e1751256b1630f12ddcca312d39c12f946ddb8d2ef1aedfd93366

  • SHA512

    6e519681b2f037cf24b0c4ef13b5fa393c97217558df317ee34b15dca1f7dd3e3fefef1e09d75d8a841e9a1443c05a1a140dd3692d03acc701e6d992ff82764d

  • SSDEEP

    6144:Rv7rQB28fQjOOwXDcGJTe78sLwkawiycycHuQ3QN8Ky6dbBekUW8Bx2d8TcuKxB:Rv7rQBiMTsrLwtycTK/yoUs+TcuGB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b6676091b74c9af31d4449ed02c9c63.exe
    "C:\Users\Admin\AppData\Local\Temp\0b6676091b74c9af31d4449ed02c9c63.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\0b6676091b74c9af31d4449ed02c9c63.exe
      C:\Users\Admin\AppData\Local\Temp\0b6676091b74c9af31d4449ed02c9c63.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0b6676091b74c9af31d4449ed02c9c63.exe

    Filesize

    73KB

    MD5

    76c336a41ee0a18543be752dce31d701

    SHA1

    701f3999ba7b79013f490f19cc01687bfcb9a28e

    SHA256

    d9eea80ff3074f571d5927cdc46ac2c895eb09a40aad0fb60adc39bce9166b91

    SHA512

    3758b2c9521b80d420c117a8330353442c702a8855254ac676215fd881b10fa5fa3d9b0ada77463b30b9f0f394f9d50cf956f7d2027bfe023726c82f4db4d9c1

  • C:\Users\Admin\AppData\Local\Temp\Cab6FB6.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6FF7.tmp

    Filesize

    122KB

    MD5

    5e8034328e3318a9619c1542c0d6550c

    SHA1

    b26c51da42a1483f62f50237b8262eb6abbb0b8e

    SHA256

    fc0bc7530e18b6df2c2176beb36215341f0549f6c689889fcbfe5a553d19b3b3

    SHA512

    01627f1612628b1b77032f4d54619b3405778a3e480fd2e5002c32d1dff01c11b8622be52d03474173130904d59c6401de0ade1751a12591507ced53c872db86

  • \Users\Admin\AppData\Local\Temp\0b6676091b74c9af31d4449ed02c9c63.exe

    Filesize

    136KB

    MD5

    d6328abb2a8d708ca87ccc8b54e41677

    SHA1

    841ac7c0d7d9d7c3241a6292fe4ffca7fd836a23

    SHA256

    f665eff992749b84c2ee58c43e1727f17534e74aad6cbc63a9f6bb6b8098dd98

    SHA512

    4b1cb1b8e4df6ec0e8a3980897c21fd3ade3ff46b1cf66267815a7b6b632186464b4f17a548da7f5b3b61d368e48f6f23cebe4fd5aab85ab37a2bb5a708b272a

  • memory/2184-14-0x00000000002C0000-0x0000000000326000-memory.dmp

    Filesize

    408KB

  • memory/2184-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2184-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2184-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2184-2-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

  • memory/2256-19-0x0000000000340000-0x00000000003A6000-memory.dmp

    Filesize

    408KB

  • memory/2256-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2256-25-0x0000000001470000-0x00000000014CF000-memory.dmp

    Filesize

    380KB

  • memory/2256-76-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2256-82-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2256-81-0x000000000EA40000-0x000000000EA7C000-memory.dmp

    Filesize

    240KB