Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/01/2024, 21:21

General

  • Target

    HA_EasyWmvtoDvd1.61_LRH.exe

  • Size

    4.8MB

  • MD5

    33cb5c0f4b4e76bfa011755c0e418228

  • SHA1

    34975350283a8f83dd26bf276adcb225fb47930a

  • SHA256

    5089149b4c6bfe0bc0e0fb3c923694e9c89334e8b871ad37a2d9ae2d3a5d9536

  • SHA512

    374f3e18bb03319355e6f0420807b28974e636051884b6acadb01dcc67c36fc20d37156c8c3793170f271292126aaa1076e8c808d4389412e4092a5e5d7d814c

  • SSDEEP

    98304:m9dEjjJKv4C/mjYKf6uS8s4XznVloFwix4fJAkMFcTDxe58lcE:7jJK7IHf6uK4XznX4wThmcXmZE

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\HA_EasyWmvtoDvd1.61_LRH.exe
    "C:\Users\Admin\AppData\Local\Temp\HA_EasyWmvtoDvd1.61_LRH.exe"
    1⤵
    • Loads dropped DLL
    PID:3868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsv5611.tmp\InstallOptions.dll

    Filesize

    12KB

    MD5

    83304a78d2b6ea45ea8404f4cd78721f

    SHA1

    d5c5d19653c751c08579dd094bcc9fef1841af00

    SHA256

    92344973083c0a5d8f5732814c1315124e8e0a2f1ed912583a081f95f7549414

    SHA512

    94076cc935927925641d668c19b389d007ff7e8623f2afe706fc73d1ecb97210577a828a727404b200d9870e14b23d6bd047de9201d629e7443a929c0740c67e

  • C:\Users\Admin\AppData\Local\Temp\nsv5611.tmp\brandingurl.dll

    Filesize

    3KB

    MD5

    9c3488b5e9655d1837c3963ecec33f70

    SHA1

    f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3

    SHA256

    05ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a

    SHA512

    6af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7

  • C:\Users\Admin\AppData\Local\Temp\nsv5611.tmp\ioSpecial.ini

    Filesize

    683B

    MD5

    5044250ba1d62865c70cdb009c3df129

    SHA1

    2c5f489aad85e368275f3126d09ffe95a6847ee1

    SHA256

    92fd38f05547016156bc0bf8e03f20072b1d7b6d6eb6793a5ab0afa839bd8e1c

    SHA512

    e161aafdaee21118c5c9606a69190cfab1f595ca2a51c36954a614004e57c4a2791545b2b64ba3279e35e6bf3973c2090e6119ce5f209101981cc7d06ece6e06

  • C:\Users\Admin\AppData\Local\Temp\nsv5611.tmp\ioSpecial.ini

    Filesize

    723B

    MD5

    20abc519175ddf6dfac0ebe81a54154a

    SHA1

    f4ac962067159d838f72a6172cc2f3d236d7ea00

    SHA256

    3cb4e1e5198344828802b136dd11ec78a1b8e96b11e6092a099b92066ace64fb

    SHA512

    852617989d0781cf54389245d73265b287059e5304f6405666d6243e0da469a87ca3de83fb5374710e0bc759153dd8d89a0f8e00dc55b034b51152dafbaa177a