Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 19:52

General

  • Target

    290aa0012a700a049e72cd5bf3f89819637fcae59d4b1273c0da05e5511c74bb.exe

  • Size

    23KB

  • MD5

    2bbd6ca5c0f3618188bc311db9348775

  • SHA1

    421ea74fdb810235a4135f72f9386216486a813b

  • SHA256

    290aa0012a700a049e72cd5bf3f89819637fcae59d4b1273c0da05e5511c74bb

  • SHA512

    e2164b9bf79e7d5e7eb7d47e84dad5ae984a91f6bb3e3dfaf6ce5b646d6c7e8de149b69d58a53d27c53c351e215fc93eef63c0b86c54ed1ae2560efc3d4fa7db

  • SSDEEP

    384:WOw2RGQfMSF+Exwp/eCSPJSQTebw/lpdQbSQ/RUfCiSJHX/6nT:WOZRGQftFaGPMQTep2/ChPAT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\290aa0012a700a049e72cd5bf3f89819637fcae59d4b1273c0da05e5511c74bb.exe
    "C:\Users\Admin\AppData\Local\Temp\290aa0012a700a049e72cd5bf3f89819637fcae59d4b1273c0da05e5511c74bb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar6F7C.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    23KB

    MD5

    128e87d9b7b9f578f6631ac7e32f96a0

    SHA1

    f00e74141e27f7f45fddb822774a7013a552f5cd

    SHA256

    a2461fdb5fb4eea136890de434260e07beedcce212db5a9a7dcf980c214fb7b2

    SHA512

    da0d39aad6808f10c34db7ccf93f83e009045a644c840ad1d6161a1ffc8d0dd36757b9d595582a0789b6755e75a1da1bab8241a329756e0f25faaffb9cb43dda

  • memory/2852-11-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2852-13-0x0000000000550000-0x0000000000551000-memory.dmp

    Filesize

    4KB

  • memory/2852-14-0x0000000002A80000-0x0000000002E80000-memory.dmp

    Filesize

    4.0MB

  • memory/2852-15-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2932-0-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2932-2-0x0000000002B40000-0x0000000002B41000-memory.dmp

    Filesize

    4KB

  • memory/2932-9-0x0000000002B50000-0x0000000002F50000-memory.dmp

    Filesize

    4.0MB

  • memory/2932-8-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB