Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 15:03

General

  • Target

    56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe

  • Size

    227KB

  • MD5

    56c7c8dbb0eb3a743a96bc2b4ccbccd6

  • SHA1

    98da4979bebfcbd7212db25f857e21947aa49ba5

  • SHA256

    1246d67d866b350856f273187beaf829b6bcba477e7e4302b89cb16ae5fc5299

  • SHA512

    ccedab420d4d625c17c0f28d9cc52a5df62091eda3bc18683f6be36cd731541f5aba3886e7ca356a6ca7b05e818d668800777b0a7b973530f7680977d3dea1bd

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8FpSkgnYEkgJ:o68i3odBiTl2+TCU/4k8nkM

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe
    "C:\Users\Admin\AppData\Local\Temp\56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      76B

      MD5

      58427bf50a517286de9014d3c49edf24

      SHA1

      d05349924e62f3d19cee92b75dc1031cbb39755d

      SHA256

      589cceb08ae9a4064c2946470d50f56af073aa2535a37a293f81978000a1eef4

      SHA512

      6b765a34dd5aac9a19c0cc347b41e6e45b0f31f69a906be175e0f19827503568a14ab5a9f5aa2cf22c6709750b0ec41512d731ac30a4b101587ecb760e9e8d27

    • memory/2272-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2840-62-0x0000000002360000-0x0000000002361000-memory.dmp

      Filesize

      4KB