Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 16:16

General

  • Target

    592a8d494d1ea06e199846eddfcb46df.exe

  • Size

    1.9MB

  • MD5

    592a8d494d1ea06e199846eddfcb46df

  • SHA1

    068ae60fd0d23cc2cfa6b16bb41ccb307ad87bc9

  • SHA256

    4f5e9adab812625d49dcb7bdc907ee19103316451f5ab5fd3039e08e751204dd

  • SHA512

    d22cf5afb95db8280e97649a8fe12d0ea3b7a048d23f270f7e9141a395f9e15df88544c87e14109420d6c99282bd7b48835b71df8c7b86189df8df161e633721

  • SSDEEP

    49152:Qoa1taC070dN6cmzXCBXjucAvRp/YUXzfne/AezlbfprPR:Qoa1taC0yGccjiAezlBPR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\592a8d494d1ea06e199846eddfcb46df.exe
    "C:\Users\Admin\AppData\Local\Temp\592a8d494d1ea06e199846eddfcb46df.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Users\Admin\AppData\Local\Temp\CCD.tmp
      "C:\Users\Admin\AppData\Local\Temp\CCD.tmp" --splashC:\Users\Admin\AppData\Local\Temp\592a8d494d1ea06e199846eddfcb46df.exe ECEF4A51AD39FFD34273208E491167EE10EAE6D1B008DC573BF641CF61237228C4B8EF4A267E0FFD204617B38E3E557888AC969A7353364C6C7190D56D55701D
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\CCD.tmp

    Filesize

    1.9MB

    MD5

    5bf09c897f2a8c15f73c83460b7dd5d6

    SHA1

    25e9ad28b0cd8c5151419ff4d3c88f751c018084

    SHA256

    0ea17edb7e6f0a552bc910d260c4d919bfce089d8f7ba8742efe7dacdc3e275a

    SHA512

    e052711a9e3f16122390cebfbe673de7c5d573f5ebbfb15295ea4c2995e2fe696dd7dea8d5b58ae8784d4fc2b81ab996bf9d5aa5d228e0f7725c0352b54eb49d

  • memory/2320-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2800-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB