Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 11:41

General

  • Target

    40c47e9111a3447061ed12bd69e09620.exe

  • Size

    907KB

  • MD5

    40c47e9111a3447061ed12bd69e09620

  • SHA1

    0ffcbe09a6dcd1156d2825cfeb0e9267a4544821

  • SHA256

    b6ab643664b74a120fdbd66c5f0e01388ff05bcd9f22f0c32532c612464d8cbc

  • SHA512

    f119b76e98ef90f356e10c710ea61fc640b3b5f90ec957f8c2777a3cae6383607498ad9205a9fe805f14852288d6a8a25967357fef61b0805316a1aed5e742b5

  • SSDEEP

    24576:apKdXZ8KZryfjMN+K2bNKe0f1lzbqa/ZS1:acdZ8+rUfbNf81xqgS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40c47e9111a3447061ed12bd69e09620.exe
    "C:\Users\Admin\AppData\Local\Temp\40c47e9111a3447061ed12bd69e09620.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\40c47e9111a3447061ed12bd69e09620.exe
      C:\Users\Admin\AppData\Local\Temp\40c47e9111a3447061ed12bd69e09620.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\40c47e9111a3447061ed12bd69e09620.exe

    Filesize

    93KB

    MD5

    2f48d635c54487ee26ab90c119a7c0cb

    SHA1

    c22ddc047100e9b924aea5a163d4ec282b52db8a

    SHA256

    94f79d73c7bc921cd5a3cb6579dbc0f016c9d30a6f2cc9c40e2d90b787b44f58

    SHA512

    5273dd24f466177a07cda357de4bc43d5718247a91038b7483e642e88f5a0b8bfb558408150e7dd85f34b13d14ab6804be69d43aed130ca49dfc9591a89f576e

  • C:\Users\Admin\AppData\Local\Temp\Tar13F3.tmp

    Filesize

    92KB

    MD5

    71e4ce8b3a1b89f335a6936bbdafce4c

    SHA1

    6e0d450eb5f316a9924b3e58445b26bfb727001e

    SHA256

    a5edfae1527d0c8d9fe5e7a2c5c21b671e61f9981f3bcf9e8cc9f9bb9f3b44c5

    SHA512

    b80af88699330e1ff01e409daabdedeef350fe7d192724dfa8622afa71e132076144175f6e097f8136f1bba44c7cb30cfdd0414dbe4e0a4712b3bad7b70aeff7

  • \Users\Admin\AppData\Local\Temp\40c47e9111a3447061ed12bd69e09620.exe

    Filesize

    99KB

    MD5

    18c4eacc5b312f3b899069cb703cebc5

    SHA1

    c48b40a522579153b04793cfc93216d02a164eac

    SHA256

    f698a56e9ee5717077ebc53c635f129507e64668fca3eb359f9de6df38d5ab5a

    SHA512

    4a94d3a88869379d085a44f229e2d08155ce92ebfa510b7879ccab9929706bb3e4dec4faa6372369c16fd3911b172680f25e3f535893db3f343496ea6c50fd68

  • memory/2392-14-0x0000000003200000-0x00000000032E8000-memory.dmp

    Filesize

    928KB

  • memory/2392-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2392-13-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2392-4-0x0000000000290000-0x0000000000378000-memory.dmp

    Filesize

    928KB

  • memory/2392-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3052-17-0x00000000014F0000-0x00000000015D8000-memory.dmp

    Filesize

    928KB

  • memory/3052-24-0x0000000002FA0000-0x000000000305B000-memory.dmp

    Filesize

    748KB

  • memory/3052-23-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/3052-19-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/3052-88-0x000000000DED0000-0x000000000DF68000-memory.dmp

    Filesize

    608KB

  • memory/3052-82-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB