Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    20s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 20:04

General

  • Target

    2d8e470786747dcaae274468c01402626471b0d450791ab5564c47cdfa1680ba.exe

  • Size

    538KB

  • MD5

    483646523ab5bb962d62c958147b2e30

  • SHA1

    bb7c4a49be3c49f788102c63743c7a4f2692122c

  • SHA256

    2d8e470786747dcaae274468c01402626471b0d450791ab5564c47cdfa1680ba

  • SHA512

    9bc2dd0751789c23c1efa19f65b9b0620b6a369e218c060b63d30590300f8946c5b9d5227f166ded057b04180aeda5a88e93261a8e6fc86da358d4eff0efd790

  • SSDEEP

    12288:wlbk+h1gL5pRTcAkS/3hzN8qE43fm78Vd:Wbk+w5jcAkSYqyEd

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 9 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d8e470786747dcaae274468c01402626471b0d450791ab5564c47cdfa1680ba.exe
    "C:\Users\Admin\AppData\Local\Temp\2d8e470786747dcaae274468c01402626471b0d450791ab5564c47cdfa1680ba.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2144
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devEA1.tmp!C:\Users\Admin\AppData\Local\Temp\2d8e470786747dcaae274468c01402626471b0d450791ab5564c47cdfa1680ba.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Users\Admin\AppData\Local\Temp\2D8E470786747DCAAE274468C01402626471B0D450791AB5564C47CDFA1680BA.EXE
        3⤵
        • Executes dropped EXE
        PID:2568
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devEA1.tmp!C:\Users\Admin\AppData\Local\Temp\2D8E470786747DCAAE274468C01402626471B0D450791AB5564C47CDFA1680BA.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2D8E470786747DCAAE274468C01402626471B0D450791AB5564C47CDFA1680BA.EXE

    Filesize

    538KB

    MD5

    16c2c1ad899ed91db1e77f88820e8d2a

    SHA1

    131e8ee1e9c5049cd385e178b324af2439a58072

    SHA256

    9e30b395f1a32733798c41c53b3d0646ca771474633edfaf7ea0e9c9cee5d975

    SHA512

    db517d85bdca2b291dba455c9856581f2ef5a22f8f8033807a25b7f264c5b18f484ce2d6e51d26f9bad898b8d5d4e9e4a1591bfc4b6d7cdeca37ec7c984c9561

  • C:\Users\Admin\AppData\Local\Temp\2d8e470786747dcaae274468c01402626471b0d450791ab5564c47cdfa1680ba.exe

    Filesize

    538KB

    MD5

    ecc1718b0328081b3e44671bbfb9b280

    SHA1

    17ed197767199f1497594ccafd92b2aeb670d4ae

    SHA256

    f47ddf9a26217a68decb9e9b9d41ca38751c79dcd08868af01c84a945bade70e

    SHA512

    59b402d3db84154680f15dfc528c45a9c4eb9ac9cd7c27b6cbd43132163269def661099b0209526942bf5b75a6fb42c25056f5601ea7c6b8a9542373ec0a0ff5

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    4ab094d42560608f8a0d136b7f1dec09

    SHA1

    6d767dbadf7ce1283eba38cfe72f4b26c3df4b9c

    SHA256

    966657fe798be044425b81c853a453e33c6d98b9a2060d26a7e4b460770c5080

    SHA512

    56fa8e60b391ebd7e08a774b0c82388f55967f9260f4b46ea6737ab73b8c6fef059e2be5c646cb3be75af21d58ca1ca534cb2f45eee0c49f6ed77c21bb647701

  • C:\Windows\devEA1.tmp

    Filesize

    458KB

    MD5

    619f7135621b50fd1900ff24aade1524

    SHA1

    6c7ea8bbd435163ae3945cbef30ef6b9872a4591

    SHA256

    344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

    SHA512

    2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

  • memory/1296-13-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1296-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2144-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2144-33-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2680-29-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3024-16-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3024-32-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB