Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 16:39

General

  • Target

    Data/textures/textures.exe

  • Size

    100KB

  • MD5

    eafc8bc40ac3d50fa86d1b1cb36d0416

  • SHA1

    8beb4cca6238bbe3d38d2ea4256ffe03007ef217

  • SHA256

    1c91b4a302b48a2517576a83a3496ebca1874dbefdfa040cfd40a4bf7f06c124

  • SHA512

    76fb392329d1d93c7c7d5c3f9559a7c4bdc3427a3970222354a10e0ec315abe92561f5307a71fcb1b7b16222b87f28b42aa97045b26397b3825ea70153bb0568

  • SSDEEP

    768:JKp1NUtlkxTBPW5yX9x3K0gZ/sBoTe+bs5iNVqiNzJOvUkPvRw4cLO1l4kSAtLJc:JZmDK0gwaWJlcLO1l4lAJJtHC

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Data\textures\textures.exe
    "C:\Users\Admin\AppData\Local\Temp\Data\textures\textures.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    PID:1824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\olemdb32.dll

    Filesize

    23KB

    MD5

    dc0e4b4cc6fc4f01362aa97ada62f86b

    SHA1

    854e0fe0199a4c14c84f8d9510c039c2f7790d9c

    SHA256

    7ec225a6d4db4ebf265d739e2da0852739e65d0d57e0f8a8d24f4442aa7caedb

    SHA512

    f217873b3c7146c6f2ff19691305e9afbf49ba523811cc041981ec221c55eeecedbdda2fb56a775e4a3015e7ee4155e756247001135e67a0a5898618b26c6c22

  • memory/1824-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1824-8-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB

  • memory/1824-13-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1824-14-0x0000000010000000-0x000000001000F000-memory.dmp

    Filesize

    60KB