Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 19:21

General

  • Target

    1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7.exe

  • Size

    555KB

  • MD5

    269f6da393a0a8c20c7470d5ad2fad18

  • SHA1

    e5e73f8ff6e5dd42cd117faef429c1477cf67fc7

  • SHA256

    1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7

  • SHA512

    bf8020f495c41a3fbe51e0fdde3a4ae13b7d13d72ca4ac2bec8dc3f826ddf89dc68d2e3ee76c5c54a09169cd04c85055edde1529c23808ae45910cfe23a08c36

  • SSDEEP

    12288:lXa8sUK3VkdqLuvghCwOM1bBbOV/dVpTRgTEyai1yA+ued1A4LeB7plZx0p:lq87K3CJgowOMVEV/5TRgTByA+uLH7pU

Malware Config

Signatures

  • Detects executables containing possible sandbox analysis VM usernames 19 IoCs
  • UPX dump on OEP (original entry point) 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7.exe
    "C:\Users\Admin\AppData\Local\Temp\1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7.exe
      "C:\Users\Admin\AppData\Local\Temp\1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Users\Admin\AppData\Local\Temp\1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7.exe
        "C:\Users\Admin\AppData\Local\Temp\1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2360
    • C:\Users\Admin\AppData\Local\Temp\1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7.exe
      "C:\Users\Admin\AppData\Local\Temp\1e9301515c7e2555c71060ca5281ee2cb2c7197f59924a586f27281fea2490f7.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Windows Sidebar\Shared Gadgets\brasilian beastiality hardcore uncut legs ejaculation .rar.exe

    Filesize

    730KB

    MD5

    dd45a8febf12345eaa037ef97545f2ea

    SHA1

    2e0025d4aff69b7c727484b6d60904ab4a292c8e

    SHA256

    706d9fc45f3329283442008dd686ed27f3b71730855cdc3b5033b0e28f10ecd4

    SHA512

    f172c55d2922a5230965a87a8c9fa3648952896422a31a815ab182682ca84fb87c525ce96b45af71df3d7aaa0b4cc25ba5e1d0818d65fd37ad7b37ff77ecd0be

  • memory/1092-11-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-100-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-136-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-53-0x00000000051C0000-0x00000000051DC000-memory.dmp

    Filesize

    112KB

  • memory/1952-156-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-89-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-152-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-148-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-93-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-94-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-118-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-10-0x0000000004CD0000-0x0000000004CEC000-memory.dmp

    Filesize

    112KB

  • memory/1952-106-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-95-0x0000000004CD0000-0x0000000004CEC000-memory.dmp

    Filesize

    112KB

  • memory/1952-122-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-126-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-130-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-0-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-140-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1952-144-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2360-92-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2360-54-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2408-91-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB