Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
tuc5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
tuc5.exe
Resource
win10v2004-20231215-en
General
-
Target
tuc5.exe
-
Size
4.6MB
-
MD5
bbd6c397ebe993fcc61895265adae480
-
SHA1
b087e55a6d6a15e4fbd09d4641e389c80e3be62f
-
SHA256
3c21c1067f2f7fd008b20dda0422e4b50f679aadf5e91817889f58d759282f1d
-
SHA512
637ab0dd6966a132163a96ed5189703f450f73cc14758d31143bce765d7d95c3809f66d5c27fede311417914a8b7ff4df63fd7a947dfd97e3eca2e10720ebf2e
-
SSDEEP
98304:joMwMk2nFZC/PkQ/dq5FrCGhhya/eAasl3WqfVkrqoBHQnYZS/4dm8:6t2FZLQ/iVoAH3zkmoCMC4dD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 tuc5.tmp -
Loads dropped DLL 4 IoCs
pid Process 2440 tuc5.exe 2736 tuc5.tmp 2736 tuc5.tmp 2736 tuc5.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 tuc5.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2736 2440 tuc5.exe 16 PID 2440 wrote to memory of 2736 2440 tuc5.exe 16 PID 2440 wrote to memory of 2736 2440 tuc5.exe 16 PID 2440 wrote to memory of 2736 2440 tuc5.exe 16 PID 2440 wrote to memory of 2736 2440 tuc5.exe 16 PID 2440 wrote to memory of 2736 2440 tuc5.exe 16 PID 2440 wrote to memory of 2736 2440 tuc5.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\is-1IACF.tmp\tuc5.tmp"C:\Users\Admin\AppData\Local\Temp\is-1IACF.tmp\tuc5.tmp" /SL5="$5014E,4620919,423424,C:\Users\Admin\AppData\Local\Temp\tuc5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:2736 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 1832⤵PID:2996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 1833⤵PID:1368
-
-
-
C:\Users\Admin\AppData\Local\Start Energy Free library\startenergyfreelibrary.exe"C:\Users\Admin\AppData\Local\Start Energy Free library\startenergyfreelibrary.exe" -i2⤵PID:1896
-
-
C:\Users\Admin\AppData\Local\Start Energy Free library\startenergyfreelibrary.exe"C:\Users\Admin\AppData\Local\Start Energy Free library\startenergyfreelibrary.exe" -s2⤵PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\tuc5.exe"C:\Users\Admin\AppData\Local\Temp\tuc5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5751239344f6e39cbad0219ef5f13ea8b
SHA112556893409cee78cb84f2f86187366e593b6e15
SHA25653b22c0943a210b64a898d20770bd1c4c0111eb264719810ed258c8890c1137f
SHA512c3a824b85c4978795e8997b2a8844b6063b078866775cae958902bce39434a517641a53d26bfb424df32c52573b4290d1ccfc41a04a266d7464bdaf201ea3e48
-
Filesize
9KB
MD5cc3079285d1ab2113781a5acd00b28f8
SHA1a40716106fd5321fdf2435fe31360f5817c546dc
SHA256818c698036dc274546c47e385136c2d08bd6a10ada84ebb0e9b45aa36c4f3c18
SHA5129754a8169a3b9417405d435ef289a4974325b31beb3dd7198c69bfb0559e3e95de4499443826d6eadb288b8822048507ec928f77784db377558d60e11474e1b6
-
Filesize
12KB
MD57fe4c67b1f22b659ffd40948d067f473
SHA1ce4ea38a021a83297f466f78324e8a105f84968a
SHA256168decf14a45baed8650b894e293f87bac41c9abc6814e7e86b49356eb59e6df
SHA5127d0f97fc0ec21995e5e4fd318fe4972c150ae0f23b2197e4007ed6c48564837c4f73d181f8a81ccd6266e99a742ae1fa2d8c13593c83e37f4fc9cf02dc99cf51
-
Filesize
1KB
MD57791059c15b13576a401a9d464d0a913
SHA12440a117dd1c0fdc210515f1bdca4a680eb2f2ac
SHA256228824d5dfcb516d916be3716b0f482bbd54a2a3e1eee106040f860b7b44e3e2
SHA5121f5a9894a5245bcb088a51dc067f957cf366d85602ef8aa16b678fb89f11a07b31006b65f6e52157d5cdcb366fc5f2d6a5b6602e959f3a8777e82a682d2d2185
-
Filesize
5KB
MD555db95a923f0a41bae6590c8ec84f9e8
SHA1800ec81c2c43c9ba12b27e823138854be1277b40
SHA256507e74a2ac2be411ac753960ae9326cc72e8f3007f6710c21886c8b2b0d6c5bf
SHA51268ec04f08d8585646ee86d284882f6c0a3dcde0c1825825c5d0d6815ef2879dc905afece7c0713092a4487c1ef901fa01f6179acf8f8404f1f0f4c90444f1853
-
Filesize
10KB
MD545a4ed2fb9cf4a9df0c0919cf53c1b69
SHA12aacf831dab5bf4e698d066f6530e58e474b3abb
SHA2561bda602355d1a4f00d28dc4d8acdabe8eed6e233f509a9db123b8eba6db901fe
SHA512ece207ddc9ebd95ee607c153c60f78103028a6a1405c0f5fff3cd5a52c36d4b4afb689460a0c8b398816e6876fcd887bf060db913103c766ead5c7a35cea5707
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
12KB
MD5d3ab240e04521ff884d87210200dfd0c
SHA1b717a9004cb195f5b1c8d9f53c7b1d36338ee6a4
SHA2567bc52c5f5eb6ab2babf29e6401bfe60fe44e27add99be597503ecb0505587d63
SHA51291d94e3bb2c5c7720f83199d9bc229ce5f9f6cbdc575cedaa24dcec1ec49488eb9c4512ab28d2c6a74c0c9c9e5a25bdb7eac767d76879b5a065fe16048ef4190