Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 11:33

General

  • Target

    173c1c4bc8288b09bf36c84f845030d2.exe

  • Size

    2.6MB

  • MD5

    173c1c4bc8288b09bf36c84f845030d2

  • SHA1

    2a893dbb8dd04579cbdadff737c4e384f7fe897a

  • SHA256

    0084b6efe2d6a67272e8d82f4b2193211c03481ec37d82e5191e2a9289f59998

  • SHA512

    28f1cc7605d0e983fcd01b5a8824b0a5d10dd2dd1fce67f22727bbfc2c9d989faf7a5d070969f65f9a1f088e0862c8b84d5dadc5d1ed935ca9af3b9eea0a9174

  • SSDEEP

    49152:dsoyGEUkf6MKbUPj5D9s3fZJe1+BMb1Fcxay3:66MQgT8W1Mu+3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\173c1c4bc8288b09bf36c84f845030d2.exe
    "C:\Users\Admin\AppData\Local\Temp\173c1c4bc8288b09bf36c84f845030d2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Users\Admin\AppData\Local\Temp\173c1c4bc8288b09bf36c84f845030d2.exe
      C:\Users\Admin\AppData\Local\Temp\173c1c4bc8288b09bf36c84f845030d2.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\173c1c4bc8288b09bf36c84f845030d2.exe

    Filesize

    1.4MB

    MD5

    9a450ceee9e930584eb4c75084b5acda

    SHA1

    eeef8d846b2c995973ab12b204313d74cea0c9d7

    SHA256

    7c5cd8821b85656314b093b9ec75d67d1da54567b37684853464a06a76073498

    SHA512

    19e80d333bc409c51822292a74e4017e964b04f74fd4d882f7188ef4b95c802eb9edd1d62fdec451258b02b653071d027cccd1f46bb7266e97b04a72dada8287

  • \Users\Admin\AppData\Local\Temp\173c1c4bc8288b09bf36c84f845030d2.exe

    Filesize

    1.5MB

    MD5

    c59d084ac4dfa66a8ae755850ca95841

    SHA1

    4e608b9a68074656c96ce240d3c670cae470d7b7

    SHA256

    982cf19aed32bb702a7283be1506d17ab5ab9aa2b0351c83c18e97a069b2aade

    SHA512

    362dcc8b06d41a75b10495265eabf4e502136f833fdc73bfa850ba246bf474ec39122aefcb8959f2b36a2065c8d998bad526a58645ad1091c60e41ca44a52a28

  • memory/2608-17-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2608-19-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2608-25-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2764-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2764-1-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2764-3-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2764-15-0x00000000038A0000-0x000000000423E000-memory.dmp

    Filesize

    9.6MB

  • memory/2764-16-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB