Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 02:18

General

  • Target

    6439825726ab2c6d37be560ab2372ed8.exe

  • Size

    771KB

  • MD5

    6439825726ab2c6d37be560ab2372ed8

  • SHA1

    b3332fe2470d74342fe8fa32b874b49c6ae918ca

  • SHA256

    a60b310bb5e53515c319e765ce0f04f83b16703f7910c44228eda35741ab0b86

  • SHA512

    90d2cb965b9cce40086be969685dfd81baf9beac1743dc1c519c5f60b141d88367726663bff563613a6906d2d5dada130c7cddb2da0a58a288bd920c5d18353c

  • SSDEEP

    12288:Hx2X1IVs7a11XAcnl3zcv51LBg3PzJLniYZ/C9OFEIif0F6rerfrEhU8zFVMB:HoCVsaXlDcvfBg3tvZWqEIz6qrfiTMB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6439825726ab2c6d37be560ab2372ed8.exe
    "C:\Users\Admin\AppData\Local\Temp\6439825726ab2c6d37be560ab2372ed8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Users\Admin\AppData\Local\Temp\6439825726ab2c6d37be560ab2372ed8.exe
      C:\Users\Admin\AppData\Local\Temp\6439825726ab2c6d37be560ab2372ed8.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    54KB

    MD5

    285da7bb579888b8eafaf9b6b8923b90

    SHA1

    6dc76e557fd8a9cf9d6b33d7852beab1818dc38b

    SHA256

    d86a4bd7b93b3a380d6874f87cde7fb230643544b593154f5ed65e42058b0857

    SHA512

    74886c67264409d5b44c3119700262c266d134641e4d95b99c7c60c9d99f9d7c73acc5ca3cfcca0c8e8fc02ef5bd0e4cc0b32ad8369166fafc1ebc3bd5383f3a

  • C:\Users\Admin\AppData\Local\Temp\6439825726ab2c6d37be560ab2372ed8.exe

    Filesize

    332KB

    MD5

    2020e22e70369d711dadf200779f0012

    SHA1

    886ebc7f2be9099c3cb72be77fea963d82cbc443

    SHA256

    08fe57e94f497872a23a0e948fd7dd5e2686abdfbfe2b97af49f75e5e1f5314a

    SHA512

    bec195c3673556c5a1ffe88fc6ad7769ef0e90193a8b0efca9d2aaeca98a2926f645496390e2fceac430ba88b76871b0f0ae5fb21cf984b25c19e47f5a2402a4

  • C:\Users\Admin\AppData\Local\Temp\TarD6E.tmp

    Filesize

    17KB

    MD5

    752560b3f41ed6e4ea6fba906b7a48c1

    SHA1

    28982e5841f23b09e00ccdb7fe13efc4c58194ee

    SHA256

    0d8fd8bab6f1b79d5bd7ca846f4aecc74c505244da8b2c1ab7562b0a887c9b1e

    SHA512

    99371c79a53b00f4a25d153ee491e2c6cf24e3d13302a4463e4f94b87674c9ae141de23e207e48334bebba99f5c2833ee66d734668eea1598bb965ecbb98dec1

  • \Users\Admin\AppData\Local\Temp\6439825726ab2c6d37be560ab2372ed8.exe

    Filesize

    597KB

    MD5

    e08493cb4cc11226cf2fbeb40596f022

    SHA1

    c2d5e6c45c02467059b260b09ed0bfa1ee06e39a

    SHA256

    00999cc20a6fe4a02f0c6cb25ee896aa8b54639dced8d39ac95eb20ec4523b80

    SHA512

    60540e225d002ea3d9738a803218b2eb20a3d4334a49b2f697e59ff1e1c55d930176a2b22ebd643bc62ff78677da3ce057a1b698b978d6f8745ee78aa617443b

  • memory/804-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/804-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/804-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/804-2-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/2992-15-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2992-28-0x0000000002D20000-0x0000000002D7F000-memory.dmp

    Filesize

    380KB

  • memory/2992-22-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2992-18-0x0000000000370000-0x00000000003D6000-memory.dmp

    Filesize

    408KB

  • memory/2992-87-0x000000000D630000-0x000000000D66C000-memory.dmp

    Filesize

    240KB

  • memory/2992-86-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2992-81-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB