Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 04:58

General

  • Target

    db6eeda520ba1de3fc9a415fa4953bfd99aaf2ae788fff04c932aa9b2fb01521.exe

  • Size

    599KB

  • MD5

    4ffe6c1b2513512609c0de724dd81426

  • SHA1

    1abb5d1f2d6c5640b8208c4344c9b6352eecf3c9

  • SHA256

    db6eeda520ba1de3fc9a415fa4953bfd99aaf2ae788fff04c932aa9b2fb01521

  • SHA512

    7c56e1d53381733e9c57f13d0901ce4743aecbac6e8df7385ddd88f2d4413b34f44a62342ccdbe7bd0e842dd8bc253e90d4ff4940b4c0d15f27168df7d19796d

  • SSDEEP

    3072:LtwizQTj8CSUYf8W3nSjen++Bj88OZS0/Qe2HdOLlqw1aQuoYKN6LS12isr:Buj8NDF3OR9/Qe2HdklruoYk6LWG

Score
9/10

Malware Config

Signatures

  • Detects executables packed with ASPack 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db6eeda520ba1de3fc9a415fa4953bfd99aaf2ae788fff04c932aa9b2fb01521.exe
    "C:\Users\Admin\AppData\Local\Temp\db6eeda520ba1de3fc9a415fa4953bfd99aaf2ae788fff04c932aa9b2fb01521.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Program Files (x86)\Internet Explorer\casino_extensions.exe
      "C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Windows\SysWOW64\casino_extensions.exe
        C:\Windows\system32\casino_extensions.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Windows\SysWOW64\Casino_ext.exe
          C:\Windows\SysWOW64\Casino_ext.exe
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1796
          • C:\Program Files (x86)\Internet Explorer\casino_extensions.exe
            "C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"
            5⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:3056
            • C:\Windows\SysWOW64\casino_extensions.exe
              C:\Windows\system32\casino_extensions.exe
              6⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:2604
              • C:\Windows\SysWOW64\Casino_ext.exe
                C:\Windows\SysWOW64\Casino_ext.exe
                7⤵
                • Deletes itself
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Suspicious behavior: EnumeratesProcesses
                PID:2724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\casino_extensions.exe

    Filesize

    613KB

    MD5

    e18a4ba1134f8792a9f6311c618a167b

    SHA1

    15015b16bff0e1ed1bd2c0ffe08352e00b4ad323

    SHA256

    3ca44c1f4c287d4c27373780be2c1643a6a259d05c0bbabe890ccc2b0ba306ae

    SHA512

    2119d188e56c49e10c8b9f8c3547ae250d2714678300c546af8ca0db90c51b8846910181510f752ab30f47cae66a4a89d0178f23e170e02fa0cb64469b9988ad

  • \Windows\SysWOW64\casino_extensions.exe

    Filesize

    602KB

    MD5

    f7c2c7f65cdfc478eddca86f677a49b0

    SHA1

    2ad1c2a604de8dc39e5de7fdf019ce35fc676657

    SHA256

    952364cb52408963711186cee42f2ad0297d337b84667fd5a5dfff4971efe54d

    SHA512

    530d0fa4aa17f425b5d3cb3d34898c8943d081fa7a37f0d158e14c91dbed0ab48c79dbe94545af81bafe88d3a534a98ca193664331e0fc48785394012b73f294

  • memory/2388-12-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/3024-13-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB