Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 07:30

General

  • Target

    71a278956e360787f976ae641b6b3bbc.exe

  • Size

    907KB

  • MD5

    71a278956e360787f976ae641b6b3bbc

  • SHA1

    498e47b9099e51b803e7fb14fe892eaf9cff0d82

  • SHA256

    dedc30557e77d295d1c3bb9fb00cfb5b497ca8e06c4223040c2e90dc8ca1f7a2

  • SHA512

    535ad823fb46b1b4f09430482b9d5576de96947f41b4c9ed30f4b650eb8a0067e262e6cc75651401ae2bf1bb8bd9df53c319959862e901fefbab6ced74131c57

  • SSDEEP

    24576:AZBBgrsqI0wdBwFtkU49Vfm8aM8gFvKVYLa/ZS1:+PgDwdGkU2pm8X8oLgS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71a278956e360787f976ae641b6b3bbc.exe
    "C:\Users\Admin\AppData\Local\Temp\71a278956e360787f976ae641b6b3bbc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\71a278956e360787f976ae641b6b3bbc.exe
      C:\Users\Admin\AppData\Local\Temp\71a278956e360787f976ae641b6b3bbc.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    24KB

    MD5

    4a7b5da8afca0388cf66e00689f7fff1

    SHA1

    3c38ccbe18532bc33c82c23bf08567cda54c658b

    SHA256

    a3347e3c74f66f17eccc3882c597ff1f953e302027f8858980bc5663584e527d

    SHA512

    9010c2d08883e7f94666edebcf73ff91a1fa83bb16506ad6ebf79739b8a3cf8cf54b4f185f30fdbcb5b4f31ecb65d7b652dd030fb9cb9affc3e85c2ceebe67bf

  • C:\Users\Admin\AppData\Local\Temp\71a278956e360787f976ae641b6b3bbc.exe

    Filesize

    162KB

    MD5

    fb50c948b833467fe3056963e6bff412

    SHA1

    59b49965720efacbb0f959c87578174369774ee9

    SHA256

    4bb9220eae2759c6a54a15dac49c19390f7f030d70665e4143f7123dd66efcd6

    SHA512

    07bb013a13a1bade1348620a7ad339866e05c9bf922a21466cd532c46a6423110b3d2a4b7d91329b54c21875892ca3e11572a25a87158d60f198cc15a9d9d1db

  • C:\Users\Admin\AppData\Local\Temp\TarB3C.tmp

    Filesize

    21KB

    MD5

    df3fe7a6749ca31b6fceb82d52f3f6b5

    SHA1

    ddd5e7381201cf04ad664f0addabc79edeb5581a

    SHA256

    767a99ce11a1d71fa906034eafc46cb9a7f037a484889eca10385358134c5021

    SHA512

    5524ced5a4546b5d395206d80d5da5df3bc2fd87cd77c3c6b07688b748dd0162afb3a031a3b478bc93705dacbb1c1818519d90a82d2961c6a0309c5c8b66b831

  • \Users\Admin\AppData\Local\Temp\71a278956e360787f976ae641b6b3bbc.exe

    Filesize

    282KB

    MD5

    ca337e91204ed9787e40737f56a50f28

    SHA1

    7dab41747bed4810acc8f3dc71fa2c4b9bcb71c6

    SHA256

    c0d4d7aa74513dcf84397e64097b4acce9a37c52e423f94ed29b111f9be88eeb

    SHA512

    0c8d8fdf8776e2a103eb6c52c58d21f51a52a4db0d110324ebb864fe925048126d089735dd73caa78f93a95b34025525148935cf8337822cbb4269b60b5b31b9

  • memory/2324-29-0x0000000002F40000-0x0000000002FFB000-memory.dmp

    Filesize

    748KB

  • memory/2324-18-0x00000000002D0000-0x00000000003B8000-memory.dmp

    Filesize

    928KB

  • memory/2324-20-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2324-23-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2324-88-0x000000000A7E0000-0x000000000A878000-memory.dmp

    Filesize

    608KB

  • memory/2324-82-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2896-13-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2896-14-0x0000000003210000-0x00000000032F8000-memory.dmp

    Filesize

    928KB

  • memory/2896-0-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2896-4-0x00000000014F0000-0x00000000015D8000-memory.dmp

    Filesize

    928KB

  • memory/2896-1-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB