Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 11:39

General

  • Target

    a1c6ca6ac53767bb9d6895f18ba2e784.exe

  • Size

    1.9MB

  • MD5

    a1c6ca6ac53767bb9d6895f18ba2e784

  • SHA1

    92a70e507183298c44b3fc64dca40b4d89651f2d

  • SHA256

    1861254a57c7a618b4507d5282f2587b426656fbbefea74e566e3dfc7bfd1cd1

  • SHA512

    38e54921c890d53ebe500e76f79c0e2d8a693867eb5575279699690fa0bb83151155dec1bb126c80a4111fa32b07bf0aebe450f9fe3b48bbc13b711a66bd4c55

  • SSDEEP

    49152:Qoa1taC070dTAoYulUyadMwrSa3BrcT/mQ/geTMMi:Qoa1taC0foYrhd7SOcLxwMi

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1c6ca6ac53767bb9d6895f18ba2e784.exe
    "C:\Users\Admin\AppData\Local\Temp\a1c6ca6ac53767bb9d6895f18ba2e784.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Local\Temp\5985.tmp
      "C:\Users\Admin\AppData\Local\Temp\5985.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a1c6ca6ac53767bb9d6895f18ba2e784.exe AB6DEF0F39F5CDEA7C661FB8E6D85B361C5CE5A942098232964BE2FF5EAD6CDA006B04F12F2AFE9C6438F349752ABCC55FCC2C46BB680A00A8B5A2CD19FFA639
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2976

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\5985.tmp

    Filesize

    1.9MB

    MD5

    90fd448e3a28e1b58548bd48228d4605

    SHA1

    8289c1a81f23e6df6531903076854c4b301b073c

    SHA256

    38f495f8ce478091235bd56bd786b8ec621e6fb2c163327e04811ee15eed4bee

    SHA512

    e76c716cec04da0bd0cb372a4660c93206270b64aeffba8b33a8cf1f5580b576c58c37372fae985ff54e25660532b069b178007cd87d518381ba27c51648446d

  • memory/1500-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/2976-6-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB