Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 08:23

General

  • Target

    b6f6cd34d3b07ec6f2a42c100b9fbc37.exe

  • Size

    1.1MB

  • MD5

    b6f6cd34d3b07ec6f2a42c100b9fbc37

  • SHA1

    cd330dcac42bfdd993267d35cb5f5084eb57d3bb

  • SHA256

    f97d64216848a25ca49c460158148a63bcb2e1a360748ad4f73ec6c595316140

  • SHA512

    4bd27d95a2e104635cb84d9c8c2abccf1b1799a42801c9e6604d9c37098d05a9c84b59a529f14bd4b2538c63e8651f7a6611305844652325f6cd8a1b0d792d9e

  • SSDEEP

    24576:+fOykA8OkSAfEjluwVvbOtEIAJcxunlcu5q4pSWBTKxTQWVhL:+Gu83fk1VDOthUuOqKSWB2xTtL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6f6cd34d3b07ec6f2a42c100b9fbc37.exe
    "C:\Users\Admin\AppData\Local\Temp\b6f6cd34d3b07ec6f2a42c100b9fbc37.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\is-ENK9G.tmp\is-1V184.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-ENK9G.tmp\is-1V184.tmp" /SL4 $40146 "C:\Users\Admin\AppData\Local\Temp\b6f6cd34d3b07ec6f2a42c100b9fbc37.exe" 892206 74752
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-ENK9G.tmp\is-1V184.tmp

    Filesize

    132KB

    MD5

    c6d42e38dec79ab32c00ce9b3d790d17

    SHA1

    69ad8d14a15b1e54325d49124c3328caa27c4b7e

    SHA256

    61d7d70b92fbc96a8cd935b45546624be4f4fa9751474ef69d30435de4bf479b

    SHA512

    8371c46f3bb4dd7d9633ee1a34d002450654a9271b395c632d83e9056956a4e463cb230d8d28203fbe88fa44c2bb265205b74b4cdd14a9d94d1f2cf8627a92dd

  • \Users\Admin\AppData\Local\Temp\is-C408R.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-ENK9G.tmp\is-1V184.tmp

    Filesize

    679KB

    MD5

    ab914322fa0a88c9233d1d6ba25a378a

    SHA1

    24f60405d73ad2a305cc5583a748cb397fe24d46

    SHA256

    36be221923f25b232fcadfa274f6ace34a75f0214b2b607ff931095d61a9eb9e

    SHA512

    954d255a6ee350b5a0a39dd29f720923a50209e28f4ed2c3965ad7535d7968e01c48b324b3cd88c6499067a907e483a9e7bbc2911c7fd5254cea57155d85f976

  • memory/1940-1-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/1940-17-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2904-9-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2904-18-0x0000000000400000-0x00000000004B9000-memory.dmp

    Filesize

    740KB

  • memory/2904-21-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB