Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 11:52

General

  • Target

    3cc8b47589033aac42d062eb2499cce9.exe

  • Size

    5.1MB

  • MD5

    3cc8b47589033aac42d062eb2499cce9

  • SHA1

    3fe261456e1da79d3531ab730ec3972495300a4c

  • SHA256

    3e0b42f81161ed0c28f8e4d519f89b77c3a4dd13b856e00a36c05aefa1a8a7c1

  • SHA512

    7aa88fcf57c4a53734e4b0389bc5cce13080fb4fccd856606e8e95d0654e219878254b2981b86e05911dae4cd999c65f2c8527465ca868ffc1d271123c97f262

  • SSDEEP

    49152:chm+XlPolMz+66BHJ5+alnhjDkmPz7gI+tHOSLay35bkrfg8FYri+ts5EjdZwaA2:3LBHJj9LJ+xNz30g2yOEjjs9/g3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cc8b47589033aac42d062eb2499cce9.exe
    "C:\Users\Admin\AppData\Local\Temp\3cc8b47589033aac42d062eb2499cce9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\3cc8b47589033aac42d062eb2499cce9.exe
      C:\Users\Admin\AppData\Local\Temp\3cc8b47589033aac42d062eb2499cce9.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3cc8b47589033aac42d062eb2499cce9.exe

    Filesize

    4.1MB

    MD5

    98d6ef2a658c9a706b867def3c7da8ea

    SHA1

    34dc92c1808c850459024c96dfd4da2cc273ba56

    SHA256

    718c4f8c586596b28b13a2c2082d1f07fc7be571001cac34ff7e1fb9bb0a06b8

    SHA512

    2585f27f89056480ba840ef34ee563a20f8f3e0bfbda56b4c0d7393bb89f622f0343fd34c8a144991d17d3734ed8c964cfab987c9abab84186c020b4ae8a5546

  • \Users\Admin\AppData\Local\Temp\3cc8b47589033aac42d062eb2499cce9.exe

    Filesize

    3.0MB

    MD5

    a7857380a2e360496d5080cb09faa089

    SHA1

    00a8186594d4cfe5032b49bb68df91f1a0df8537

    SHA256

    fec1fd17bdc498e2814a156160ab6447cfbd431112331ddd2f67251f235f65af

    SHA512

    d9b72e40de366925e08fff0c6e8da50cbe24e8161f9cdea5699fde7fd370b25a5e577dd4e929683d3ff2f824fc82e68378141e5f72f9985bd029f6eeb88241ba

  • memory/1180-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1180-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1180-2-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/1180-14-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/1180-16-0x0000000004060000-0x00000000049FE000-memory.dmp

    Filesize

    9.6MB

  • memory/1180-43-0x0000000004060000-0x00000000049FE000-memory.dmp

    Filesize

    9.6MB

  • memory/1768-17-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1768-19-0x0000000002240000-0x000000000249A000-memory.dmp

    Filesize

    2.4MB

  • memory/1768-44-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB