Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 21:08

General

  • Target

    54951ff37df817dcb0332a4bbb4bc70c.exe

  • Size

    133KB

  • MD5

    54951ff37df817dcb0332a4bbb4bc70c

  • SHA1

    1cf673d28073aadd64309d4a40582a269a78c58e

  • SHA256

    0dc62521d573056f2f0233a89266da606c0aaa06bfc6c7ff54227b7d2235174d

  • SHA512

    bc7dfe83d274caab6d7d6298557e82bfa537c84464f70da7a3981f760fc3cae19fd45568bbe19641cc039fc4edc9173434a04b238480087d25ffe6b5e2d7d8cb

  • SSDEEP

    3072:Le1JIPaHziEl443HBvoFvmwAnJF3iHzv+4Ng3P4nfLbBfZjQ:q1JikziElPHBvoFJAGvJU6PBfZjQ

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54951ff37df817dcb0332a4bbb4bc70c.exe
    "C:\Users\Admin\AppData\Local\Temp\54951ff37df817dcb0332a4bbb4bc70c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\54951ff37df817dcb0332a4bbb4bc70c.exe
      C:\Users\Admin\AppData\Local\Temp\54951ff37df817dcb0332a4bbb4bc70c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\54951ff37df817dcb0332a4bbb4bc70c.exe

    Filesize

    133KB

    MD5

    c20f77dc2ad3bbafd6244a372edc857b

    SHA1

    9f4600bbfcba5ccb47916289c39194877ab6eb10

    SHA256

    cf19d3978c427098c64a15a59fa00703cee12e08516e04bddcde505412ca102a

    SHA512

    7e88c8eea20af40d3af71c09987d9b959e4f3609e84a7e8c0e6df63d79fdd988fec810075a5275f577aebc3e488082caeafcb275570b5d98cc5c1a6da86076f9

  • memory/2312-19-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/2312-21-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/2312-42-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3004-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3004-2-0x0000000000150000-0x0000000000171000-memory.dmp

    Filesize

    132KB

  • memory/3004-1-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3004-15-0x0000000000220000-0x00000000002A6000-memory.dmp

    Filesize

    536KB

  • memory/3004-14-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB