Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    11s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 19:51

General

  • Target

    2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe

  • Size

    615KB

  • MD5

    cd5a3037f111dd08a62a1dfaea55fe15

  • SHA1

    6410cbbb863d904fa789fa22c8a0aa771c2111f8

  • SHA256

    2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79

  • SHA512

    63dd7f43a6c87b55bee27f7a8fd0815c40ee3fc66095aa48666b90ee3e31e16097ef807711799c45f77c0685daef43dbcf8af458289f7858d1bdf248aee58b0a

  • SSDEEP

    12288:wlbX+Waplw9U+qMi8CtdVldusIh6BBHCHrKZXCktSzIzWpX5x:WbX+NYTqMi8CtBd2QHCHmTBW5x

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe
    "C:\Users\Admin\AppData\Local\Temp\2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2948
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev28F4.tmp!C:\Users\Admin\AppData\Local\Temp\2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE
        3⤵
        • Executes dropped EXE
        PID:2616
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev28F4.tmp!C:\Users\Admin\AppData\Local\Temp\2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE

    Filesize

    615KB

    MD5

    72655d8e8db634cbfdf6093bbe8042bb

    SHA1

    5d33963b083b3282e6cf125fc6d298c4d4e3a9b4

    SHA256

    afb08709bfc463d60dd27c60d7759289c13af0a29783bb39fbcef0e3cdfa2f93

    SHA512

    312da48c58e9200124339554f53573fbda7bd6dce471651318dcd081656655286b65f5074bac5de6b2ecd442d6a8d6794405668af4bdb5de288a180ff849c167

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    336ffd74e5eb29bc13e4e0f5de0cb57a

    SHA1

    fb3bab77482267f8880cd329d926a41d397d072d

    SHA256

    688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79

    SHA512

    e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76

  • C:\Windows\dev28F4.tmp

    Filesize

    568KB

    MD5

    04fb3ae7f05c8bc333125972ba907398

    SHA1

    df22612647e9404a515d48ebad490349685250de

    SHA256

    2fb898bacb587f2484c9c4aa6da2729079d93d1f923a017bb84beef87bf74fef

    SHA512

    94c164a0b884c939ece30f5038d07b756702998d46786f9f613fbea2eb30bed4bc19a409f347bb4cc565898473b18155d580b453683223beaf30ed4079c251b2

  • memory/2328-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2328-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2428-30-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2428-33-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2500-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2500-36-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2948-20-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2948-37-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB