Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 15:06

General

  • Target

    77ad9bf5898555c36ce5abeb39943adf.exe

  • Size

    1.9MB

  • MD5

    77ad9bf5898555c36ce5abeb39943adf

  • SHA1

    4b313f09dc92913430a73b43ad4fa8bb9af1e3a0

  • SHA256

    c85f55f4ce7864b8ba3fdc42685f6c3bde1b90803f5d617696e08693b36973a3

  • SHA512

    200dd0221bb49c5e1ceceee0f8049045f6682c390831d5e7a0ba8c7e2e103c2fb17a916525c17372d98276a44e49a41d26237128592b25d6e4becb1442bf8150

  • SSDEEP

    49152:Qoa1taC070dz3zUrufJRi9rEM7XAVYceOPZ:Qoa1taC003gCfq9rEGeYCZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77ad9bf5898555c36ce5abeb39943adf.exe
    "C:\Users\Admin\AppData\Local\Temp\77ad9bf5898555c36ce5abeb39943adf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Users\Admin\AppData\Local\Temp\4D84.tmp
      "C:\Users\Admin\AppData\Local\Temp\4D84.tmp" --splashC:\Users\Admin\AppData\Local\Temp\77ad9bf5898555c36ce5abeb39943adf.exe 50D8CE35F2E314E658359834BD5C99282500CB1F6F85F5E9AA5D57E4AD921CA5C61DA64750A9A18AC5ECFC4B57161EA023972B913E4AF372D1EA0DE70B8F267B
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2508

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\4D84.tmp

    Filesize

    1.9MB

    MD5

    2d6ed19a7910406c55daf603014228da

    SHA1

    f0cff3f2add26dae62449c7811a73cbbb14a76e7

    SHA256

    7ceb676cfbf277029a2ff3bce2d872f76a626cd537cc11e96282e98fa00a30df

    SHA512

    1946c9f13683f0197af3705dedd162a92907b9a63e76a63491ea7d107b6ff5e2edf3f2cf6a61f7e9f6b910dfa6ef413cdc48598a3fdeac64bbca608d513a3e3a

  • memory/1016-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2508-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB