Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 08:39

General

  • Target

    9b398ad7a8fe54c90924c4b8962268ca.exe

  • Size

    1.9MB

  • MD5

    9b398ad7a8fe54c90924c4b8962268ca

  • SHA1

    5c0b9f1108ca79a6b6cccfdd5ad479903add27a4

  • SHA256

    b6355fd0e2471f44d90abe120671dc928ce2dafa3e3bee018355837598a0e9eb

  • SHA512

    10ea20ee2893da173b4b477ba7f63866988e9397baa5f597140ecbb830cef17e3cc3ee00e24be9d5e89b03c2fa1299234828005051a516cc292d1f31431c753a

  • SSDEEP

    49152:Qoa1taC070dS3j5Jb7LC4ocA8cD9lOaao:Qoa1taC0bjLbq4DcD933

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b398ad7a8fe54c90924c4b8962268ca.exe
    "C:\Users\Admin\AppData\Local\Temp\9b398ad7a8fe54c90924c4b8962268ca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Users\Admin\AppData\Local\Temp\166E.tmp
      "C:\Users\Admin\AppData\Local\Temp\166E.tmp" --splashC:\Users\Admin\AppData\Local\Temp\9b398ad7a8fe54c90924c4b8962268ca.exe 511823F141D139DBA76B9DAF3F7FE7AB9A00457A0CC367B8AF889562F65832EB3B662B4425CFAE9A73AAD9E0594D9D0B7B38973BB5D41094A0FDFB0E9D2D7790
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\166E.tmp

    Filesize

    1.9MB

    MD5

    2261471d669d987e5621f76542858774

    SHA1

    1817dcc38d14e78cdfcea83442a7e3982561cc93

    SHA256

    3aa24e52d48fbaffc082004e7ada18d3f800c29233e134cf1f3a78430a984380

    SHA512

    07a06a6df7c8d4af2bd3ae724782edc00ec2a62dd5ba4b2fe65bb4b9fe48ad5583b9b0f56819cb05be5f7c6710e0f4d14129316933a878294801df8f488ee078

  • memory/2856-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2880-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB