Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 07:46

General

  • Target

    1285301cfe6b4d43d9f2c2de3b08fefc.exe

  • Size

    133KB

  • MD5

    1285301cfe6b4d43d9f2c2de3b08fefc

  • SHA1

    9a3b7cf91f19023b00407d5897f80d4e221c056d

  • SHA256

    52139c0b5ef8b95914e58aeae34b9078aed63331d305caf8019a3c005ba73d81

  • SHA512

    694e43cd58655600f7326be17a317f5cb219f6f23e653c14caa818bf953e680e1de78727c3d78d2721c5d7cb56ed9031935dbcd1810f92fa093aa7af57c549af

  • SSDEEP

    3072:ZyA4kXdIxyCkyuuj2j50TW1uvIUt+xwz0ggeSb2lzqC3Bx3etQ:UA4kXGxye2Wi1uvIq+ezzNbqCxx3sQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1285301cfe6b4d43d9f2c2de3b08fefc.exe
    "C:\Users\Admin\AppData\Local\Temp\1285301cfe6b4d43d9f2c2de3b08fefc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\1285301cfe6b4d43d9f2c2de3b08fefc.exe
      C:\Users\Admin\AppData\Local\Temp\1285301cfe6b4d43d9f2c2de3b08fefc.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1285301cfe6b4d43d9f2c2de3b08fefc.exe

    Filesize

    133KB

    MD5

    f6b2fc0d00e21f692efd4023dcc3ffe2

    SHA1

    1d6ebc0b16aafd0e52b0bac9c4a6e299cc7dcc51

    SHA256

    d35bb10f882601dd7842ede897998c0ca6e8c2c66f2ad0d3e475aa15aba56d38

    SHA512

    cdac20a3379938c73cf5586e082c76b0769eb26e18e444fe9ce9be8dc92fa1f2af7ada0d968ae9362b2e7ccd27cee5802452002e37baec469c958a3973460f1a

  • \Users\Admin\AppData\Local\Temp\1285301cfe6b4d43d9f2c2de3b08fefc.exe

    Filesize

    72KB

    MD5

    a5127d7e76d8ba32b3d0478859f697bb

    SHA1

    621e1d54f417a5105ee4665d486054fb492a3775

    SHA256

    a2055b3de6cf7daa9ae244ef80567ac7a5885b59d5ded0bc86dc527e729f7d50

    SHA512

    7ee9b069c1bff99222f6d5833a6e7d9c4d8cf9f3e6f1c465bff762ff7ec154cd9d04044d32077b232d4797ed3d712a9bb0e21b7662770a64be5ca1f204be8922

  • memory/2684-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2684-1-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2684-2-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2684-15-0x0000000000190000-0x0000000000216000-memory.dmp

    Filesize

    536KB

  • memory/2684-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2684-43-0x0000000000190000-0x0000000000216000-memory.dmp

    Filesize

    536KB

  • memory/3068-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3068-20-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/3068-44-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB