Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2024, 21:19 UTC

General

  • Target

    8a8e9c8e6fcc61a168b24575bbaad0e0.exe

  • Size

    2.5MB

  • MD5

    8a8e9c8e6fcc61a168b24575bbaad0e0

  • SHA1

    4af10c41fc426a33ad3367f075b632503c827ef8

  • SHA256

    50f9155bab85c2a067335e3878d2dca6d1c01bd928d9c30b76034956c01a1f54

  • SHA512

    d79240dd81651003f61ca3bfa3b9463995a1977df54a2ccd824049821e6b8e04d2d96178c0d9593d079eb5bd7130938c6b7e6042d42c458b9cd00d2d5b0cccc1

  • SSDEEP

    49152:v2rT/j0AG7BmgYBf/ZkYDXAOcLIY81SfePXDdBbWTqJEobOcOJM3wcBaV:uvj0JVm/peYDXAOcZUgkXJ5xVbOc+M3q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a8e9c8e6fcc61a168b24575bbaad0e0.exe
    "C:\Users\Admin\AppData\Local\Temp\8a8e9c8e6fcc61a168b24575bbaad0e0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\is-IGHMV.tmp\8a8e9c8e6fcc61a168b24575bbaad0e0.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-IGHMV.tmp\8a8e9c8e6fcc61a168b24575bbaad0e0.tmp" /SL5="$70120,2244477,53248,C:\Users\Admin\AppData\Local\Temp\8a8e9c8e6fcc61a168b24575bbaad0e0.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-0QTQI.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-IGHMV.tmp\8a8e9c8e6fcc61a168b24575bbaad0e0.tmp

    Filesize

    669KB

    MD5

    52950ac9e2b481453082f096120e355a

    SHA1

    159c09db1abcee9114b4f792ffba255c78a6e6c3

    SHA256

    25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

    SHA512

    5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

  • memory/2088-9-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2088-18-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/2088-21-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2268-1-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2268-17-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.