Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 21:53

General

  • Target

    57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe

  • Size

    29KB

  • MD5

    6ae43bb525fa22668ad44aa50af5ed79

  • SHA1

    d0969ec006e281ba370d3f1915ac7394683f8a8a

  • SHA256

    57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5

  • SHA512

    7e0e7b3f7eec6f70bc994c6be78b66a30511c11f567d800426fef661ab53299ea2f75dd9e6db81b373d4df316eabc5c6d56934375af97d04fea78dce9eb0bf84

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/y:AEwVs+0jNDY1qi/q6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe
    "C:\Users\Admin\AppData\Local\Temp\57556b654d0a99489e759e190124fcb4fdc4da771613af20ab0cbd6f6c0793e5.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    15067ffe47bc706511e7ed19964e8bbf

    SHA1

    fc78ebec560d8a94aef0d2fb7109d5bd5bd94d0e

    SHA256

    d3154fefe7028a31052b119fc7e2e4b86bff8643fb262bf797dccdac8e9e941a

    SHA512

    15ce84d7e4ceb4a3bb4039c4240bb751789c33389fbb69f1d2b95784d84b50bb1b6e1abe6fbab55fcf6504814f566d7c4b2e5b50c5005196b5ea8217ad497519

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4b6fd657140c2b6d33c92e065ba5f0d

    SHA1

    d14dd9d196844d9cf24c547f1d866d8d27ce4631

    SHA256

    3a8753816c182a81916d54c80f2fa09f14869b9fc399e78c714711cce05d67de

    SHA512

    34cc5b8fc84428807f881167d435a411436d1d37cc0e78e63bc700011361de3fdac1e64d68dc4e9b6dfecf56f6933fe4c2a7df1d7e3d4d7a5fd40826b4312d67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a53b022fce60f509b5ca8c7b0cca496

    SHA1

    98040c4de9ef236d21b68f29004787d5b6c157e6

    SHA256

    0508ad2aa7d72fda077058eae267b2c349362f3fb4e224171c20f2629e53864f

    SHA512

    3cb99cfc8750729253650c4488166bdcd9eea2da1849413979eddcd940b90a46721b46126ac7279117ac3b68f412e9e50e3d9289d3aa43cdf7343b674b68f151

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ff1feb5c9d53e04bf46ce8e5976ad5c9

    SHA1

    7da1cb67b2147b938476d62607fe0e76ea4ae457

    SHA256

    4503b05860c77f2acbfb9d9c49d2ad95bc845552df0f8873ec5ff86d3196ff9a

    SHA512

    e5671335f3db69a5d1e8df8722f8dd0e2aae11a8f0049bd2a9d2844e89f64bc9fdc5ab4efe53c970c2f2cf8bf25d05e84ff3eeceaba800bb1d2e7736a605eba0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d74dac76ab7ecfbc72e6545a613064bf

    SHA1

    e1a86ad8b84b57008b584613b0027738ac47ede4

    SHA256

    a851177520c484481223f514bc5c1513b291237392ee3093fd11239cc089753c

    SHA512

    b82da242ef3565023c6d8d9dd90d50e9281c44c96dafeae08d636bda2fe83a5daff6ff03eec21337227190ce4e47c8ccd406e81949326ba5793c1e52013a62b9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\search[3].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\CabE43E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarE5CE.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\tmpD578.tmp

    Filesize

    29KB

    MD5

    c24f2a0b17df404e0df693a3254b0755

    SHA1

    169500097935febd2ec7e388e7c1bb45fd5950be

    SHA256

    b5e291e2aaefbadf33a0e6354e68f520cb3abd8326a6d8e52e78e22be78973d5

    SHA512

    a5b52db39548c76f9740fad6503530a1135648f94d9bd6d00caa5457fbf5a6189b741e70475ad528c9c0563a449bb8a5284f008d9e05b16eb61f8b83be9f96af

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    63db9fa163fa686e82c2f312da3a4a7e

    SHA1

    5528f27a267ffdd3fc038f3e8b0da2b657923ed4

    SHA256

    8f7c7706431f0fcd6bd4d13178751906cfc39fdf5d66eba35b81651bc3d12dc8

    SHA512

    923ae94f2d164c781ed00d9d305e646cd2579513f0140d22dfdab078e29e8e3f540f5d36b643e093d59977ed25a1508d6a277cf741f8fa4143a41681b0ec7118

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    cd972e2652c15d82f543aafed633a3c5

    SHA1

    0de9f88c501665f9deb3bac56af610ddcc7e6e35

    SHA256

    862de74178edb33d0723ca27646c646dea49b7009f5fab6a6720ddc0162369d3

    SHA512

    e0d671a1c6fd58bafccb8771419549be601996ff4075cbfff071e324ad4be9fa77f12754bcaf47ed787edfce01721dcd509a6d693d5b7a4db947b5801ab22891

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2008-63-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2008-86-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2008-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2008-9-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2008-4-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2008-67-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2008-23-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2008-69-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2008-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2008-39-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2008-79-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2196-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-82-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-80-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-87-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-75-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-64-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-35-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-22-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2196-17-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB