Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 19:07

General

  • Target

    c6a5ef0560ecc2f2e81736a7106ac2ef.exe

  • Size

    5.1MB

  • MD5

    c6a5ef0560ecc2f2e81736a7106ac2ef

  • SHA1

    cb926478c98273f38e266f30f8c240c1aab87b3d

  • SHA256

    ccbff7edb9835a7814de961d4a9e57a268a8afa291bde0237eb02e4d91b69edb

  • SHA512

    c8ca640ae2f6dcaf56321a6d8500ef29e4f8bc6499d5489aeac21b2d456d46c45a37836a675133b0e78cae16dc8fe4da8d232991c2b33b573305b49a37924a0a

  • SSDEEP

    49152:yUdMFOLnwyY7AQCzn9/AS+nTikwhhay3mZEHCti9x5P2qpEwd+e/SEHPis4EDyWP:yjEwgQCzzPR3tR9vewdFPx4dWP3

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6a5ef0560ecc2f2e81736a7106ac2ef.exe
    "C:\Users\Admin\AppData\Local\Temp\c6a5ef0560ecc2f2e81736a7106ac2ef.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\c6a5ef0560ecc2f2e81736a7106ac2ef.exe
      C:\Users\Admin\AppData\Local\Temp\c6a5ef0560ecc2f2e81736a7106ac2ef.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c6a5ef0560ecc2f2e81736a7106ac2ef.exe

    Filesize

    1.6MB

    MD5

    05923a273c80365c2152307c022e81ab

    SHA1

    0910dd25b57a15f09d970a1611c4d29df9d33ad1

    SHA256

    684733af46220675d432bb6ecd49eb63c38dcce87e78bbb7b6565ccbde9ce9b4

    SHA512

    3af7cc1c5affda9c1709b7ea7ba6f3ff9cca8b0ef7fb8e6d54544ad194d6438674a82786f31a3875513f947acae87781f75122b60f712b6f93009945c1b387f3

  • C:\Users\Admin\AppData\Local\Temp\c6a5ef0560ecc2f2e81736a7106ac2ef.exe

    Filesize

    1.7MB

    MD5

    28dba6bd1c43dca7e0080bb3a20ce918

    SHA1

    5660cfef9072d76174c53210045acd7e6d46a654

    SHA256

    d66b7a27dbbdf52ededb88ab0907ea16261f78829ce6af133641780b34ff33e8

    SHA512

    df9bb48a56f1bd1bcc39b56437caa9a1d29a36a3958cc8c7cd48bb25208dd7ccb2253a9edf161fa98b52957afad585687280eb09338536cbd030b28d44950670

  • \Users\Admin\AppData\Local\Temp\c6a5ef0560ecc2f2e81736a7106ac2ef.exe

    Filesize

    1.5MB

    MD5

    025601f561b6f41da0a32ec5714e4fef

    SHA1

    16192107bb7750a79b8f19183ac5af711547dd90

    SHA256

    b37d0dc10cc0d613a03a92d8287ab8b238d70e45f9fdddc836af71806413f394

    SHA512

    1a51e945a3294872984762456527972afca00b17cb808f10bef8f619fda700e75a2bafd6c24902e4d896d1f3288b2bf1884d8717eeed2adcc8e371e2a3f0f5e4

  • memory/2248-3-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/2248-1-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2248-0-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2248-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2248-16-0x0000000004060000-0x00000000049FE000-memory.dmp

    Filesize

    9.6MB

  • memory/2248-43-0x0000000004060000-0x00000000049FE000-memory.dmp

    Filesize

    9.6MB

  • memory/2916-18-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2916-20-0x00000000021E0000-0x000000000243A000-memory.dmp

    Filesize

    2.4MB

  • memory/2916-44-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB