Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 07:57

General

  • Target

    98e305557ce73b30b6060151afd85c2f.exe

  • Size

    183KB

  • MD5

    98e305557ce73b30b6060151afd85c2f

  • SHA1

    10e67bd32e62188b32070b2201320d6db25080b5

  • SHA256

    3d8a45635cf0f22a14a601d1275506bb48e0736461d482a2940c47458fa5ef9f

  • SHA512

    697e71f14ba54cac579018302b1c12521e58ab78f30b563afb223de657386ffb6c0c1bd55eee602885bf8538ad5cce01b6a68c8dc4d028d4ea38ce58ec92420d

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8OpjBFy11AwW:o68i3odBiTl2+TCU/GhuM

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98e305557ce73b30b6060151afd85c2f.exe
    "C:\Users\Admin\AppData\Local\Temp\98e305557ce73b30b6060151afd85c2f.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2772

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      76B

      MD5

      eec3cd0f3f4dc2abe0a8c946624c9e70

      SHA1

      29453665738563fb1215485090cdca9daa9bef44

      SHA256

      ebae0c673195d0dbb4240134fca4b9674fd8bd7962265fa2bd08af1e12053f00

      SHA512

      021db6145ead1577f268db4c22bf526ac959c2418640072392635561878357906ef70a81eb3a37339d5e996c751bc5e8a5862724c0b43ab4972e582fb4e4f634

    • memory/2052-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2772-62-0x0000000002320000-0x0000000002321000-memory.dmp

      Filesize

      4KB