Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 08:37

General

  • Target

    9b3895b60aa7ea40160141ad7cb1d574.exe

  • Size

    78KB

  • MD5

    9b3895b60aa7ea40160141ad7cb1d574

  • SHA1

    7d0ec762822cbcdcc514919348ec208ea10f8768

  • SHA256

    cf2db4e305a4754cf4d9799d4681b0414b556f0fd83b5760e07c88fff637cb1f

  • SHA512

    24cff8694a04940e994c320068338d489df9f526de9bbec9dcd0d61a408ecee91b841c92c5e2c21c38f8bc645c0d6c1e323b036591ebbbd0739eeb55b02efa4d

  • SSDEEP

    1536:iZS8H/GZJ402wL7iHwMdnE4tmJ/SnKBjAlc0eV/9u68k6yNsbhC5aUFGVv9XGVv4:i8D40rL2DnVmJanK7/9u6pNuMVuVYg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b3895b60aa7ea40160141ad7cb1d574.exe
    "C:\Users\Admin\AppData\Local\Temp\9b3895b60aa7ea40160141ad7cb1d574.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\jah312913.exe
      C:\Users\Admin\AppData\Local\Temp\jah312913.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 256
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\jah312913.exe

    Filesize

    31KB

    MD5

    f56df4dcfd49c789e0c83e160c1ce623

    SHA1

    e9e2deaa69224c12c089826bd52a18592625b4df

    SHA256

    25d7057b821465f5238226b3846b4b4e589e713265f7cf8dff40ba1c3560c0e1

    SHA512

    f76e7e1f3feb3b98f25eb12885b44b92a7dde66c929721d13518486b9a4564f1fcaeeaadb7cb97f4911711c252dd43383a2fc248a3a52a1c3c62ddd00cc85036

  • memory/2236-14-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB