Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 17:44

General

  • Target

    MainInstaller.exe

  • Size

    531KB

  • MD5

    9ce448dcd7cf13dd950725957361bdff

  • SHA1

    5831ff31825ea82d90a2989e0fc0a33b859d5f97

  • SHA256

    3dbc5aff076ef9c86a90ad30e963581f7cb22f8e212aa38db29d82cf45b73f80

  • SHA512

    b4a175da3677cd3380cb3789f281f2afb10aa00dc9592217062d66eb9b5e73805886b692975d7244cdd439d8d5bcd0eb5810533284ba4b13ff02a20b792bf74f

  • SSDEEP

    12288:z/8Ze69hm2S17Y/bv9VXXLVS+n28L6OdBCZrrf3xSEowuj6ZQM7gMWZQkN:zihc17YpVE+PGsB03xSEowuj6ZQM71WD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MainInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\MainInstaller.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      C:\Users\Admin\AppData\Local\Temp\Setup.exe /PID=0 /NOTIFY=0 /FFR=1 /FFP=1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsd5FEC.tmp\ioSpecial.ini

    Filesize

    402B

    MD5

    fb31ef5f0a20bd6f36eef3bbd9d9316b

    SHA1

    61c2b513218a57909685260be62f2eecd1d54c0b

    SHA256

    2942adbc068626426729083fba319ca21bfb19f070ab87c8d7aadcd492a2990b

    SHA512

    3f6cf2ed1beb42d0addc5fbdf6d5b6fc8c427a53c8f594d31690473d05338830a061256bf1e530d5f07dd4e9d8ce99eb0e02701ec6c6f16e42f05d648a5d53cf

  • C:\Users\Admin\AppData\Local\Temp\nsd5FEC.tmp\ioSpecial.ini

    Filesize

    707B

    MD5

    4ef0924103c47c3b80f8053485b577e9

    SHA1

    7ba74e81f731fc71d7cd050a3cd30ccaca097d23

    SHA256

    d88c6677bf7ef4e1a9b13d3231ad4d6b5bc42499a85a72a5288741845af903cb

    SHA512

    908029463e9fbb9e0ebeaec6523004f5e8a3853851a23508f8f11c36ac0fe3c1464a20f78f437a510f63dc0266d6834db36f3dc9daa3318e231ddb51c6ca2387

  • C:\Users\Admin\AppData\Local\Temp\nsd5FEC.tmp\ioSpecial.ini

    Filesize

    707B

    MD5

    a22647c14fb53b12ccec17b78a486e57

    SHA1

    8c5f96d5cf2cdf80c596ea3b0c71c8bbdaa6eb5c

    SHA256

    54d4bf1eaf90e4f358a55af1cda82e7726e0990050e0df14a133af2bb3638493

    SHA512

    550dbd150c775c3facbdc16ab3b6ca66e4b2ad269ef1772de71cab51042b014bfbe6f3f2cc4f0e10146a4b91bec28ef443d75b1219024a5902b2b1faf20df83c

  • \Users\Admin\AppData\Local\Temp\Setup.exe

    Filesize

    505KB

    MD5

    5d8d0c08384ad73216d52a2eabc064f5

    SHA1

    0fa5c77fd6b6323b926c9648679e063d1bbc8bcc

    SHA256

    30522715240f4a05859099ac370dfb516097ab257402981c6a9ad31951f36cce

    SHA512

    42a3003019e39622082506c7ae50d8a27e2920fdfdf15eb9a8dbf7f1dbd49a02cd0390dabd74c136ed44e9d8ba270540ce9390f31aa84c2fc9fdfcc9e912dd57

  • \Users\Admin\AppData\Local\Temp\nsd5FEC.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf