Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 06:42

General

  • Target

    4d9dccd354f82d1bbb5d46b63233958b.exe

  • Size

    1.9MB

  • MD5

    4d9dccd354f82d1bbb5d46b63233958b

  • SHA1

    bbc753e56fa79f7f619d740cdc5af571781bfc84

  • SHA256

    cbba6518b292916370949e20994bc66329b7b5fdc9e93e038ddb60cdece9a067

  • SHA512

    8d2b8f98f02234304ab01cc7eb21962fe8f5308861f521eb0f24517c89a20dc59ce8aacd3bf25bb04832b8599117c45bea70745c897751ac4152b4d9e8067c35

  • SSDEEP

    49152:Qoa1taC070dQaDFWV/9jl59prqJBDyw5c7:Qoa1taC0iCFl59Jq7ji

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d9dccd354f82d1bbb5d46b63233958b.exe
    "C:\Users\Admin\AppData\Local\Temp\4d9dccd354f82d1bbb5d46b63233958b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Local\Temp\5FDC.tmp
      "C:\Users\Admin\AppData\Local\Temp\5FDC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\4d9dccd354f82d1bbb5d46b63233958b.exe 21F7E6D932B14402B3D74D2AB8E337436D0AABCD01B7567AD199B2C145A2263991DD8CEF1E54054F943FEA4448EA06C679C88942020C32E51A8141B967D39B93
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2136

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\5FDC.tmp

    Filesize

    1.9MB

    MD5

    a01982080d669c83e4a3e5fd37bd9656

    SHA1

    f7adccbd9849707e7722623e7f61704ad3e22930

    SHA256

    44d2877bd1ee536d368d9a4f0c6a626182cf25736e9a9b39911d275adf819bc8

    SHA512

    94224d731ef20f608374a392a3f600494bfa32fe534a5584a2673060948d45368699247c5e9f8ffa1363f813c13799402fd4f2c4da378f3173d3cf75a2a6f942

  • memory/2136-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2848-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB