Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 00:40

General

  • Target

    8dc7e0acd7054efd3a8836c100d6e841.exe

  • Size

    1.9MB

  • MD5

    8dc7e0acd7054efd3a8836c100d6e841

  • SHA1

    80c158f2c536316c520e600918ee057a0baf4289

  • SHA256

    5e2822783ece2d53963b7bfbcd74b1345c63e8b9f760699b4e86ab36145eddc2

  • SHA512

    b91ed124b59c1ec3aefc1d9cb259cdf91480b4d4a556c5d836638f1ce0be2b1fb0ac969b1b202f0833fb75d3762c44deb13943463afeaec99014be6bb32a4db6

  • SSDEEP

    49152:Qoa1taC070dFJtJ0+jepMsQ+BOMsUPEBltB3vEdZRPA:Qoa1taC0+q+jynbPELvYRY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8dc7e0acd7054efd3a8836c100d6e841.exe
    "C:\Users\Admin\AppData\Local\Temp\8dc7e0acd7054efd3a8836c100d6e841.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\5496.tmp
      "C:\Users\Admin\AppData\Local\Temp\5496.tmp" --splashC:\Users\Admin\AppData\Local\Temp\8dc7e0acd7054efd3a8836c100d6e841.exe FB0330387EBE5E778EB5A8FBDD69E1703C1B27D45A87D73FB3BE2C1D68E53492A47E4706C425B9ACB75BE58D6ECDE7FDF1EB9D48E5A973BBD56090B46949137A
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5496.tmp

    Filesize

    1.9MB

    MD5

    57310c661e53cb0bb4c653ef5d1e9120

    SHA1

    ed1e7c516d2a81a79f055787e93b217d415b25b0

    SHA256

    afe99399fa0737e8999b47ab630dc2f8d8aa10aea1888077ec624d6214d85828

    SHA512

    fcd2515fa4f6651e9b7dd6fbe2fe742bbc66c8bd23f8d658185848812eaadd13ad8e7490ba73f3c4ad3094a3aa9ff831d4e840353db9dd4a00d08db70fe44f23

  • memory/1260-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2956-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB