Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 01:20

General

  • Target

    4267574eb084fdb517ee35054ddeb95c.exe

  • Size

    302KB

  • MD5

    4267574eb084fdb517ee35054ddeb95c

  • SHA1

    5cb4271451f9aeaf7e2cae5145d218046a83939c

  • SHA256

    365e32de290683abcfeb38ded452ef283126a344d40a6128141925fb1cc5d4f3

  • SHA512

    9fd5731fa350b650b7cce7301577304cb3d03fa4d14fd8e23181ad47bf226abadf260aa779737b818db1c4c8bbb4526a119aab2ca75c86819d42e3314757f4c0

  • SSDEEP

    3072:au0vkF+dIS/NyMGVeT2GdO/wveE/AIo7NsupJGgcSoUu7yE7scN3u1GN+rQC6AR:a9NyM6d/wvd/Aj7yupJJn4e6+8mQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4267574eb084fdb517ee35054ddeb95c.exe
    "C:\Users\Admin\AppData\Local\Temp\4267574eb084fdb517ee35054ddeb95c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Users\Admin\AppData\Local\Temp\4267574eb084fdb517ee35054ddeb95c.exe
      C:\Users\Admin\AppData\Local\Temp\4267574eb084fdb517ee35054ddeb95c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4267574eb084fdb517ee35054ddeb95c.exe

    Filesize

    150KB

    MD5

    aa2ae1c421a46f5b2fa295b24cf2a269

    SHA1

    f96b6cf2d513eb9892196b30ab394320d862ecca

    SHA256

    afc981d9c68ca7eed59e112035066a4f6694cf5e6add2927c84ac1767d730302

    SHA512

    4f65f7b94c51c29e37110581a2f439664d296d81d8bc0e9780665bf357ef801951e6cfc3f099c86f2135593e41fe04f130d9cc2391d48484c9be3c1314c2688a

  • \Users\Admin\AppData\Local\Temp\4267574eb084fdb517ee35054ddeb95c.exe

    Filesize

    203KB

    MD5

    f8b13aa6ac85091c5d283d097dae8430

    SHA1

    65e8aaf5c560331a1c0ebd3eb9552c9de4574fca

    SHA256

    e958d20610d17dd61595ed15e99f76ede89e191b3eb47127f78ddc5365779591

    SHA512

    f967ed868a2d44c6ba1e05d59f9f34cb1207b0da7227c80690d1ac8fce6cb714ffbb0efef3e8b11aa00c20630eb6f6198f4b1a2f4321b12412157c201c9187d0

  • memory/824-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/824-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/824-1-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/824-17-0x0000000022D20000-0x0000000022E00000-memory.dmp

    Filesize

    896KB

  • memory/824-16-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2192-19-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2192-21-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/2192-35-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB