Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17/01/2024, 18:56

General

  • Target

    6358a73cfceb5b53a7ae122d99a2c228.exe

  • Size

    137KB

  • MD5

    6358a73cfceb5b53a7ae122d99a2c228

  • SHA1

    43ad6700e71236ba0d7b8cf54bb9d48f73e460f9

  • SHA256

    dd93817d78ccfbecdc314d9b3183a2eebee12a89c3c070bbafd4ee80ac258812

  • SHA512

    dfd4e02e7bee9b23039c47342f05a021b645b4e3972bf40c2f89c16cf3b45c65ef482aeb32b66b64341e04a39187fe909ac268d7cd01c1b8f1b07a2739f23124

  • SSDEEP

    1536:qbnGysPZixQ5rIN4xunD7TFDIblyBoNHAILzo3w9mVIZVVU7xSD/Yfrb6GhjYlWf:0xIWQhPxivyJqoSI/mVQUtrrSkKMCe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe
    "C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe
      "C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe
        "C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Users\Admin\AppData\Roaming\netprotocol.exe
          C:\Users\Admin\AppData\Roaming\netprotocol.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Users\Admin\AppData\Roaming\netprotocol.exe
            C:\Users\Admin\AppData\Roaming\netprotocol.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1668
            • C:\Users\Admin\AppData\Roaming\netprotocol.exe
              C:\Users\Admin\AppData\Roaming\netprotocol.exe
              6⤵
              • Executes dropped EXE
              PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\6edh2hV4g6db943.tmp

    Filesize

    3KB

    MD5

    95f62965058baacadb83c2da94ca47de

    SHA1

    b3115c8b56105e1eae02fda8b3536b3bf38436ca

    SHA256

    d76b2bde3f59d34dbf1bba5917bfd17470703801b17984ad90b6cebcf914deb9

    SHA512

    9fbd110938f1c0a97b1f2742c8233e28a7e2802477f9222d3e0db95c1959ed3a1183b57ca1c92f006e6dbdf3ab03297cba0c6e06e2e2778a6dfa1e4ac2d7cb77

  • \Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    137KB

    MD5

    2bb11b24670b744ab7517246b7e626fe

    SHA1

    e6becfbdc9a5b41e39d8252aa135f6e59956a25c

    SHA256

    0ee3d6af19c6849155568151ed704d2eac0b07545a07029913e651355168f0fb

    SHA512

    b656990ea5ccf501b5efddaba3cea0f960e469ea6541aec1cc0f72d45de0cf2ea5d5316b629d742e5151d9a20b84ef8a35c95b8f242b2371f180e22cf847ba0d

  • memory/2216-3-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2216-5-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2216-7-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2216-9-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2216-11-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2216-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2216-15-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2216-17-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2216-18-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2524-81-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2756-23-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2756-28-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2756-19-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2756-30-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2756-21-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2756-38-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2756-80-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2756-25-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB