Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    240s
  • max time network
    288s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 02:56

General

  • Target

    0c4544cf311ddf6f01d0d299a891a58e.exe

  • Size

    32KB

  • MD5

    0c4544cf311ddf6f01d0d299a891a58e

  • SHA1

    dd6a0886193e7053d912c52862a3bfd1d4a0d32f

  • SHA256

    df1813471aca94c82713f4bf15290f1aada4e573f6e1f4d61ec3b1791ac85dfe

  • SHA512

    87f0aa12e29a7b30848f748289d72d2f615e83756d65e26816cb6f500fb92f902cf13800fd46cab23c7feb0d4945404d036caa86d6f6bfc16c510db53c9d1a1e

  • SSDEEP

    768:nPRDqKPeuoLm14j5CrDM16LQOcx44dxfftn5:PRDqKPe9Lm14jQrDMwQOcxpdxf7

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 4 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c4544cf311ddf6f01d0d299a891a58e.exe
    "C:\Users\Admin\AppData\Local\Temp\0c4544cf311ddf6f01d0d299a891a58e.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\attrib.exe
      attrib.exe +s +h C:\Windows\netiu1.dll
      2⤵
      • Sets file to hidden
      • Drops file in Windows directory
      • Views/modifies file attributes
      PID:1556
    • C:\Windows\SysWOW64\attrib.exe
      attrib.exe +s +h C:\Windows\
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:2976
    • C:\Windows\SysWOW64\attrib.exe
      attrib.exe +s +h C:\Windows\system32\netiu1.dll
      2⤵
      • Sets file to hidden
      • Drops file in System32 directory
      • Views/modifies file attributes
      PID:1776
    • C:\Windows\SysWOW64\attrib.exe
      attrib.exe +s +h C:\Windows\system32\mst32init.exe
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\netiu1.dll

    Filesize

    9KB

    MD5

    b5f25913f5be4429d499070e127035e0

    SHA1

    7551200a282d4bf3375eb35faea9c07c8329f201

    SHA256

    0121df6f8191a9226efcf8ceffecfbf85c13df733f077483c9333b8246854f19

    SHA512

    27b17abbcceab1d8a639192f060fe9b29e237dcb0b96e2b21449de00ed585a0a548106ccce55e27cf2b53c9f68803ef51d4cc491c4523de2b01c706f3bfbde04

  • memory/2288-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2288-3-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2288-6-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB