Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 22:51

General

  • Target

    b7790340a5f9c92e58fd6244e1674938d97589c2668406ebda9ed6be6f5012b7.exe

  • Size

    180KB

  • MD5

    25e5898fb48bec69e73b452c5ff23ef0

  • SHA1

    19399bda6677f7b55f0e665372e3ebda7dfae053

  • SHA256

    b7790340a5f9c92e58fd6244e1674938d97589c2668406ebda9ed6be6f5012b7

  • SHA512

    145e8e5d5529c7bded9b65004c117a44353513fe969be7fb6c426d3cb877ab65ecd3a34ff7e0d3b99e209af414fe31bb2a1a64c4e1dbdbe6c500ef9c1957b2de

  • SSDEEP

    1536:TnHowMGIYD1Enu0TBFoiz6IDncBAZ9FMfHEhKgK7qSg1+mdIEAr:rFgK7Dg1+mdYr

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7790340a5f9c92e58fd6244e1674938d97589c2668406ebda9ed6be6f5012b7.exe
    "C:\Users\Admin\AppData\Local\Temp\b7790340a5f9c92e58fd6244e1674938d97589c2668406ebda9ed6be6f5012b7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\numuv.exe
      "C:\Users\Admin\numuv.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\numuv.exe

    Filesize

    180KB

    MD5

    fdebc2a68f4053dea6f57d1f06b4b367

    SHA1

    330cb4dd04cf91c15bc176a65c0c5dbc494cf9ce

    SHA256

    3f7aa25e98a6b4bcd3ce99dc32ea05c9a57598c87ddb322b40ff5bbba83dc9d4

    SHA512

    e560f119f4f8a68ab65e08717a5251ed95984d096e2b9e3f59f356e35503707a97827191d2426c3a4003b2fb69598a08edeedfdf1e5f7176a86ee386dd5b9d7a