Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 08:11

General

  • Target

    3c57069dafc8c8ebd5fb5c45cd35c386.exe

  • Size

    251KB

  • MD5

    3c57069dafc8c8ebd5fb5c45cd35c386

  • SHA1

    3203dc9ba643f68cd628730d36909501414b4581

  • SHA256

    4e89eed5f37f8ad9fd1befce4222575938ec25cdb592af1979cff5469f1e795e

  • SHA512

    24cd65fd062f502d90178db6f9804fdd3ae1f5c1e1b2c366767380ab006691c94a800ec0a8fae8efa8b182dbb25390a6f09f60825b45af4ff1e4a199ee237122

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8oveatQxJtrW:o68i3odBiTl2+TCU/+vePPZtkqxq

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c57069dafc8c8ebd5fb5c45cd35c386.exe
    "C:\Users\Admin\AppData\Local\Temp\3c57069dafc8c8ebd5fb5c45cd35c386.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      76B

      MD5

      33791c6b936409069dfca4ff610665ad

      SHA1

      7b6899ccdc78bb3e70070af9c57b090ed0b96184

      SHA256

      606825081128805563a9ef4f8c2929b25a5a1ab00162caf4bbc25040b7a0d59f

      SHA512

      4de5f6f2a7827cfee9acd0aab03f781cef5f722f5ecdc4a9fb15e7b63184ee12ff5b110ee6219bd14325e2b3f02ae40ca2b17032a6cf8eacf70a35fad706ac51

    • memory/2288-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2436-62-0x0000000000630000-0x0000000000631000-memory.dmp

      Filesize

      4KB