Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 15:27

General

  • Target

    b509ad9e8d7627ae75793067dbb2276d.exe

  • Size

    1.2MB

  • MD5

    b509ad9e8d7627ae75793067dbb2276d

  • SHA1

    f9ac8a93ab6c5edfaf7323d74af7f53f339945b9

  • SHA256

    cd969c06cebb54db16326a886da3fccc63e17c52de1caa4e8ca5b85c2607e4f0

  • SHA512

    cd4b9210043264dfd917df42ff54d2b4d57fb7ec80d7b7547b6e80dd499b248f8380407cbfdebc6d9517ac0af7cb3526dc141f41fed3cc5227fe9fbddeb81c5f

  • SSDEEP

    24576:kuh90tqQCjdQ5+uav4NVajDpVUd4jSyImQCjdQ5+uav4NVa:kuh9oqQeC5+dsVa/pVVSmQeC5+dsVa

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b509ad9e8d7627ae75793067dbb2276d.exe
    "C:\Users\Admin\AppData\Local\Temp\b509ad9e8d7627ae75793067dbb2276d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\b509ad9e8d7627ae75793067dbb2276d.exe
      C:\Users\Admin\AppData\Local\Temp\b509ad9e8d7627ae75793067dbb2276d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b509ad9e8d7627ae75793067dbb2276d.exe

    Filesize

    318KB

    MD5

    47337a8a26fe5ba08f25c6494b43969d

    SHA1

    1b85f118434235aca2b84af7e530babe628d7b9d

    SHA256

    5e6258d067f293653b0e607c696949806b550e57ae38ccf32f992c28ee47c9fe

    SHA512

    bef11d6869b3ed58c2997ad887c1647a407f491c31e92d3a46476f1377fc82471370df08d2d1ad223ae8a08a1537369fb08400b4133c02f812da89f336738dbf

  • C:\Users\Admin\AppData\Local\Temp\b509ad9e8d7627ae75793067dbb2276d.exe

    Filesize

    429KB

    MD5

    04de49eb5b5159ad6f079f1bf965465e

    SHA1

    5ead5c542c680018ee2fc14226ef772e132e8726

    SHA256

    60e13d72c74f9f30ef2407d9d767ccd3b81155c0eba15fad0eb82a7138121db3

    SHA512

    def06e6e104682a881d717aac8353088ecde64cd753f4cfce74526dfba638d582c84bb18e53ace0b139db42e76a6c6ed2b1343f8fd794d19976cd6abafca175a

  • \Users\Admin\AppData\Local\Temp\b509ad9e8d7627ae75793067dbb2276d.exe

    Filesize

    963KB

    MD5

    ee2820bd3d1e121ab7b32f5cef71ce16

    SHA1

    c683b0fdfab99962a7d66020a5648e0a22e218ba

    SHA256

    f80f6b013fa39893f1fdd360e0a3f436fcbe590111c97a6812d3f0d764e780b8

    SHA512

    41db75cbb135ed7a6cbaa22d2ef01ce1bff4c3ba1918471dab44e0022e2b574b1a6b2a6f2b04884a910ed760544166c3b8d318fed8c08304fb8d0c4428dcfdd6

  • memory/2692-19-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2692-21-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/2692-44-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/3048-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/3048-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3048-1-0x0000000000300000-0x0000000000331000-memory.dmp

    Filesize

    196KB

  • memory/3048-16-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3048-15-0x0000000022EF0000-0x0000000022FD0000-memory.dmp

    Filesize

    896KB

  • memory/3048-43-0x0000000022EF0000-0x0000000022FD0000-memory.dmp

    Filesize

    896KB