Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 13:16

General

  • Target

    d635d64c2c8e03ab6649938988bf50c5.exe

  • Size

    5.1MB

  • MD5

    d635d64c2c8e03ab6649938988bf50c5

  • SHA1

    b8e41ea9819372d7f5cf9c76f74991c5a3458d61

  • SHA256

    4cef0d7bb71ebed5fba36911af57039ccac167bd4a4cbb1c463d6cf12efd2e21

  • SHA512

    3f56978f9fe20b23b99531626afc408c24eb640e840f9347606673147b070e90a27801e8137b5c846bf20070209095c84fc9e4415dd90454a338e8607f952eec

  • SSDEEP

    98304:TK+wXkuO5Tg33S11qronI0Iy5fKP7grvYLS3:e+wUbp5a0j9

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d635d64c2c8e03ab6649938988bf50c5.exe
    "C:\Users\Admin\AppData\Local\Temp\d635d64c2c8e03ab6649938988bf50c5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\d635d64c2c8e03ab6649938988bf50c5.exe
      C:\Users\Admin\AppData\Local\Temp\d635d64c2c8e03ab6649938988bf50c5.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d635d64c2c8e03ab6649938988bf50c5.exe

    Filesize

    2.5MB

    MD5

    a40b84071a6a34f678454bd9a3b66615

    SHA1

    18cabc719965cd58de7cab82236ed0ade05ce4c2

    SHA256

    b6feef056585d8aa7c1b2518e304978d1e1a0c6735ef15e529977c017aafb30b

    SHA512

    2ceb57a0fb460842e7267bf801912cff3785a5f2a94574496c9ab42148e366733eac8a81e5689ff8e7d2610f48dc4d568b8cf4c8111020637b1b06579cd0bce7

  • \Users\Admin\AppData\Local\Temp\d635d64c2c8e03ab6649938988bf50c5.exe

    Filesize

    2.3MB

    MD5

    8b75a919cd0ee407d20fb23826d5a1ef

    SHA1

    c21e36f1e74fdeead4d18a7f7d43025235cf04b5

    SHA256

    a212b0e8e155f2e34c47b299341cf981a03b45773ae6db87a8e77cb60b464248

    SHA512

    5f4fa3406180ca2254a3ca99d2034946bab59fa69ac8ec07af0fe76b339ddbd69a7a519edef33685bccc38ccbb64030fae236b9e5b4cf4db8cf2765542fcc4cf

  • memory/1664-19-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/1664-21-0x0000000001FA0000-0x00000000021FA000-memory.dmp

    Filesize

    2.4MB

  • memory/1664-43-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2276-1-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-0-0x0000000000400000-0x0000000000D9E000-memory.dmp

    Filesize

    9.6MB

  • memory/2276-2-0x0000000002230000-0x000000000248A000-memory.dmp

    Filesize

    2.4MB

  • memory/2276-15-0x0000000000400000-0x0000000000605000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-16-0x00000000042F0000-0x0000000004C8E000-memory.dmp

    Filesize

    9.6MB

  • memory/2276-42-0x00000000042F0000-0x0000000004C8E000-memory.dmp

    Filesize

    9.6MB