Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 17:07

General

  • Target

    3a97bb2659734f74d307556849787bb8.exe

  • Size

    94KB

  • MD5

    3a97bb2659734f74d307556849787bb8

  • SHA1

    9e5edeca946c501eb1158f70911c073c03f8279a

  • SHA256

    c1b373f53f78eb17ce5f347b76c36048f70754dbf7e74a2e914c16d3c66dbb17

  • SHA512

    cce4e2980468954a08a1d688b9118056265a7c271db6b10d2d197eaec824fd6d0a89b69e07b9ce01b69b3d3e32a47ced3adfd02c597b2bcc28a0628d69f11e61

  • SSDEEP

    1536:8klChBhyxcwNhpMwQJBlkUmrXIqmUaVzLAbrOIbvhZ4KSUOcHM:8mChPyxcwNhwBmTITNLAbrOIbJZ4DcH

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a97bb2659734f74d307556849787bb8.exe
    "C:\Users\Admin\AppData\Local\Temp\3a97bb2659734f74d307556849787bb8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a..bat

    Filesize

    210B

    MD5

    1100b53a4f202d52507771e1d665d738

    SHA1

    13a6ecc59e678099c2c70d6ab06c9854dc6a4a1b

    SHA256

    fa61f169c281a08b704a48767ac4ffc7da8cd0a6af35ec579e40452ea1dd3865

    SHA512

    6efc0165418d70deaf93cdb8487c340d75e20787813d4d7e8b00c06efad8190c246892af9d7d15ccc936df5e57fdbc4acc76c8d07afc8b65fb6420415f2c67dc

  • memory/308-0-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/308-2-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB