Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 13:59

General

  • Target

    74df2e8dbaf64ec029461275f250ba34.exe

  • Size

    1003KB

  • MD5

    74df2e8dbaf64ec029461275f250ba34

  • SHA1

    7f365b55f6a612879110767ac1c1c1331ecf70af

  • SHA256

    d6b60e576781cb6e1b09ce304f2f3c75bc83f5c07b281e06da66751891bd831f

  • SHA512

    69091b6ff32310c1f0c93460272e6dd65d41e66f5f6e54b2e10020a36cae02a3717919961ae6f8275d5b4f35ced5d4a8a1e0bbad5603628ca031dba9e3db2ea4

  • SSDEEP

    24576:zn+kv1i5NX+Wc7KSnIyeCZi8ZSsfXdYLUcyIIfy:z+kvU5NX+Wc7KSIyeC48QsfdYLRyIIf

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe
    "C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe
      C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe" /TN uhTCmbCqd877 /F
        3⤵
        • Creates scheduled task(s)
        PID:2088
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN uhTCmbCqd877 > C:\Users\Admin\AppData\Local\Temp\1ra0Zzthy.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN uhTCmbCqd877
          4⤵
            PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1ra0Zzthy.xml

      Filesize

      1KB

      MD5

      09b99fc78824bb04b9b37e16aebf6488

      SHA1

      23c92dfc12d0ff51ca695318c70f0657231e3c8f

      SHA256

      52048596df0788e7913c3fb29e7707fc4fe3f86dc2d338fab17935cc0315a779

      SHA512

      e06a2d17c48b03825e30a0c61064a0b7d72a3949506c48631f51b60850c1b3328c165d2dadbbaa67a7c6dbca27fceca54161123806b796b9763f2eceaf11b245

    • C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe

      Filesize

      685KB

      MD5

      6cdc8864551a5b71b362e5a81d858070

      SHA1

      ed1e5a1e29d4f839770779284d347503e0f709b2

      SHA256

      2a425681457b0fff98f7b38f0703a7764a8351564f1c669fefa2be6498a82d18

      SHA512

      7d1648638c3d364d5c43e6a83433a9c987bf2c0546872383a260a319c8a068510a2b670a7ae548ce3dc828e2552355b6c31de67b07a6a1d08d92d4ef34aa075a

    • C:\Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe

      Filesize

      847KB

      MD5

      9b72a1a455263b844348413d3f424cff

      SHA1

      47a47f3458793ff0c83536ca5e108e0a6b7ab1c3

      SHA256

      896e2be3bb1d8f3ee90a16d572c5f63fe39c7e75e238b82eee557b2e1c70dfd0

      SHA512

      cb3b12201dadee99a3c0b9d54cce1b60739ccad7bed8600ca3ca8f75678d597e4ecfa8b0456ed24762201571124941db8171e636d1ace8b16173fc74f4827a8b

    • \Users\Admin\AppData\Local\Temp\74df2e8dbaf64ec029461275f250ba34.exe

      Filesize

      412KB

      MD5

      7dd2c53c7b01aa1993c2f1c9017e0811

      SHA1

      fc7d8f40f256c8e796334f9cab82e2715c2e16a6

      SHA256

      8a210b0ea2b887de9e124ea56267dfc6e686f0002841acd6277ebde1c3437c28

      SHA512

      a938aabe3aadf0b16bf5a9f87d6bd4c2f7eae283a92b9be324940f10963e48b23862a257a7d063a1395ba5e2397fca81bd4831b149763e0dd1fe7eb695025fd0

    • memory/2184-2-0x00000000016D0000-0x000000000174E000-memory.dmp

      Filesize

      504KB

    • memory/2184-1-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2184-16-0x0000000022F10000-0x000000002316C000-memory.dmp

      Filesize

      2.4MB

    • memory/2184-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/2184-0-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2716-18-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/2716-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2716-28-0x00000000002A0000-0x000000000030B000-memory.dmp

      Filesize

      428KB

    • memory/2716-21-0x00000000001A0000-0x000000000021E000-memory.dmp

      Filesize

      504KB

    • memory/2716-54-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB