Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 11:18

General

  • Target

    9949d275e7ac8c5a0bebc47d28f8aa45.exe

  • Size

    5.1MB

  • MD5

    9949d275e7ac8c5a0bebc47d28f8aa45

  • SHA1

    337131470ec47f55cfc616cd9b77fcb6e35644f4

  • SHA256

    6384a78a076ea0fd43684d132903845426ebb2600ccde5d8555d514f976a3c74

  • SHA512

    c1aa8c1b4d62ab45bf605eedf7aa92dadf406561351a2b39f946bedc162cd86076a2d320753aab5ad5f6505e3baa933813b49edf06ccdbd7c5b8a9feb3338a4e

  • SSDEEP

    98304:x4P3UWmGd3Il4Iadp35zgMi3bW+Ab+6+nwK3:xA3UAiXQzgMv+k6

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9949d275e7ac8c5a0bebc47d28f8aa45.exe
    "C:\Users\Admin\AppData\Local\Temp\9949d275e7ac8c5a0bebc47d28f8aa45.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\9949d275e7ac8c5a0bebc47d28f8aa45.exe
      C:\Users\Admin\AppData\Local\Temp\9949d275e7ac8c5a0bebc47d28f8aa45.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9949d275e7ac8c5a0bebc47d28f8aa45.exe

    Filesize

    3.7MB

    MD5

    cc62a5a5e5f1708f158903b0ad2a2fcc

    SHA1

    4f1efa48459f05602731f7076cab5240d74af6ed

    SHA256

    f505f050be294cb3a21b53e1382ef24d70591756cbe0d9433701bd1c330c7a1e

    SHA512

    15d7255de44bc50352499c20cee899f9896419ff1e00a94dd06929677a4a87f09c72ae92275e1cb224d9d14e6b11441e0e639bd21f87b0c1a3d9efa4309b7dc4

  • \Users\Admin\AppData\Local\Temp\9949d275e7ac8c5a0bebc47d28f8aa45.exe

    Filesize

    704KB

    MD5

    c5af22cb4c898af8657b05e7aa9f20d7

    SHA1

    1b3c3c65f9dccbfc8862bf505c0ad72f7dcd672c

    SHA256

    9bc1d874da4b33cd2f8242bdf8863db55138c8ae4cb988246f2a411d0cdb6b0a

    SHA512

    6b2b60250ff208ef9d8f42bfeea3411d94e3a22b9e43dc149610b56dbc03c53853bd947989055657eb48a77ee39c22f345c13b75471e5cf4cd1457959f81a8d2

  • memory/2108-1-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2108-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2108-3-0x0000000002200000-0x000000000245A000-memory.dmp

    Filesize

    2.4MB

  • memory/2108-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2108-17-0x00000000042C0000-0x0000000004C5E000-memory.dmp

    Filesize

    9.6MB

  • memory/2108-42-0x00000000042C0000-0x0000000004C5E000-memory.dmp

    Filesize

    9.6MB

  • memory/2116-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2116-21-0x00000000021D0000-0x000000000242A000-memory.dmp

    Filesize

    2.4MB

  • memory/2116-43-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB