Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 09:43

General

  • Target

    14d36fc4a50ce83ebd8dc8f0f039e115.exe

  • Size

    1.5MB

  • MD5

    14d36fc4a50ce83ebd8dc8f0f039e115

  • SHA1

    755f3de59a7c4f065a2650e46dec19fbda14afa3

  • SHA256

    ab082dbe7eb5af2ccacf9fc1fc68292cad73236ff3f13b453369c42c45818a5f

  • SHA512

    61134bb26a5f485894fc1c2deb9409ff9aa24dddccc0b43984d8c907ce83d80fc53864f59117497f7d2f3e3f89e6b134b41dae20dc8a3b4e800e5fb50247df5a

  • SSDEEP

    24576:LCMB5OXFHe3qNljytok0PfNvj4XC/mtFsFwM7ug9A8mlM5ZvmCiC9CdU9r7btyU:eMB5O1uq+mnvV/9PzIMLvm6R9r7btyU

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14d36fc4a50ce83ebd8dc8f0f039e115.exe
    "C:\Users\Admin\AppData\Local\Temp\14d36fc4a50ce83ebd8dc8f0f039e115.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A7258688\f1060155.dll

    Filesize

    381KB

    MD5

    890d61b81a6ad7c00fb24142d8f1e4e0

    SHA1

    eed8790c327a0172ebfabf07b77602657d5c8256

    SHA256

    9c50d9ce30321f6ae9ce96772154c51b1bd784e594e269a5ce10498bf3417542

    SHA512

    e5f403164ccdbbb56166573439051a5d8c9050668fd83fc0eafb1295d26708a1a102321f6be59a833a4f8fd0493cceb1437e8d23ad43e466d2828bbe0d2b9f92

  • C:\Users\Admin\AppData\Local\Temp\A7258688\f1060155.dll

    Filesize

    95KB

    MD5

    35f32a6343562b470c9f1267a4936400

    SHA1

    c4597191e13734d200636cf167a1ecd0bfb8ded4

    SHA256

    fad7a3b83468b8d58c51aa9b247ab1f3b73c6801f773018ff497b5699561c607

    SHA512

    eeb27aa6bf65e3c89d432921375e14a881e24b7744b53e4b67dcdd5a5d1350f9dee1a8c0734c982bb9fc08daeab713bfba4119cdb43455058347725bfe2dc88b

  • C:\Users\Admin\AppData\Local\Temp\nso42C7.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • memory/1260-21-0x00000000028A0000-0x0000000002960000-memory.dmp

    Filesize

    768KB

  • memory/1260-37-0x0000000002D70000-0x0000000002DBF000-memory.dmp

    Filesize

    316KB

  • memory/1260-70-0x0000000002320000-0x0000000002321000-memory.dmp

    Filesize

    4KB

  • memory/1260-29-0x0000000002BD0000-0x0000000002C63000-memory.dmp

    Filesize

    588KB

  • memory/1260-79-0x0000000002BD0000-0x0000000002C63000-memory.dmp

    Filesize

    588KB

  • memory/1260-78-0x00000000028A0000-0x0000000002960000-memory.dmp

    Filesize

    768KB