Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 11:22

General

  • Target

    c87e1a97ed301f1c46d7a6c9297ff46d.exe

  • Size

    691KB

  • MD5

    c87e1a97ed301f1c46d7a6c9297ff46d

  • SHA1

    d126557c233ecc0dbfdf40e795b84f86f7f7c9e3

  • SHA256

    7ff4cc81b6d0649d1bdb36aa34ecceebbe0f802976a30d611ff850555cbef3bf

  • SHA512

    a5f1c9cdec032508477a2161557a67232427417b820e45713c8f16fa5b0ccb56614ee8e5202449520ebe4b32b59fdbffa74c856e94af5a33085067a63ca63f52

  • SSDEEP

    12288:3QMxDCOsCvqi11lYQj4Pykuulv1yPnHYoZrb5xEfD0urv49nM/E6sO5loIxJ:35HTvqiTYQjhuryPHYoZPHoD0SZwqJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c87e1a97ed301f1c46d7a6c9297ff46d.exe
    "C:\Users\Admin\AppData\Local\Temp\c87e1a97ed301f1c46d7a6c9297ff46d.exe"
    1⤵
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\decrypted.exe
      "C:\Users\Admin\AppData\Local\Temp\decrypted.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\decrypted.exe

    Filesize

    39KB

    MD5

    232e2a111ba62b666f877497ad368965

    SHA1

    a6362059febbc8a8c0b1765f2ccc8fd242f7d37d

    SHA256

    516c1d5970a6d8ffd241d2daed5071e554391a87aae57377e50e64709e4f64a5

    SHA512

    0f5497b8e9f792600e5e8087918660c00505fa38d741860a0f7b7510ba088e7f25815612ce3af6135214c339c053917a9c566a852ffd8f51cc63bee7aca31f43

  • memory/2204-0-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2204-1-0x00000000009D0000-0x0000000000B3C000-memory.dmp

    Filesize

    1.4MB

  • memory/2204-4-0x00000000048C0000-0x00000000048C2000-memory.dmp

    Filesize

    8KB

  • memory/2204-6-0x0000000004480000-0x0000000004482000-memory.dmp

    Filesize

    8KB

  • memory/2204-21-0x0000000004D70000-0x0000000004D7B000-memory.dmp

    Filesize

    44KB

  • memory/2204-15-0x0000000000400000-0x000000000056C000-memory.dmp

    Filesize

    1.4MB

  • memory/2552-22-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/2552-20-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB