Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 22:48 UTC

General

  • Target

    8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe

  • Size

    377KB

  • MD5

    27be19895ccb4c6e74f5835f3a2075f6

  • SHA1

    ca8b7cc4741387130059c498c9f751e4dc338d78

  • SHA256

    8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356

  • SHA512

    89ed259ce4995057bbc935b38201535f19afb5e493593e491868da9c3e168210d338fedb00efb8ec91f25fa6b41c0cb05e9aa2671455ff9379d5b9405f24c047

  • SSDEEP

    6144:G72k0YujF59B+SNiT1SRws339pnPJ7ImcvKoSYxTg:0FxujX9B+lAb9ImhoSmTg

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 3 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe
    "C:\Users\Admin\AppData\Local\Temp\8edb7497f0524af271d09084ab8bff442866aff224c32826f2bb33d869f03356.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2268
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {0BBEF844-45EC-4561-8EF4-A6ECDEB32827} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\PROGRA~3\Mozilla\wrvdfyg.exe
      C:\PROGRA~3\Mozilla\wrvdfyg.exe -hzyjzia
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\wrvdfyg.exe

    Filesize

    377KB

    MD5

    55c62f34063fb7f767ae7a9e669f0fdb

    SHA1

    d76bc53975022ac221e11a5d168ac690de9b84f8

    SHA256

    c16b297f8fbee30d1d61e491b3fb6f785e894ce703c13e3ecd64e9825690b75f

    SHA512

    5beb99c3b3cc1f6c3d3c5e7dffd7098102ea3652793a1fe72fc43315b68b2144709ec583fbd48ddb59da7e3caf1a0142d48efe7a289f0801612ddd2cf96116b3

  • memory/2268-0-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2268-2-0x0000000000270000-0x00000000002CB000-memory.dmp

    Filesize

    364KB

  • memory/2268-1-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2268-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2936-7-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2936-8-0x0000000000520000-0x000000000057B000-memory.dmp

    Filesize

    364KB

  • memory/2936-9-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2936-11-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.