Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    09/06/2024, 07:54

General

  • Target

    $TEMP/uninstall.exe

  • Size

    273KB

  • MD5

    ac49750ef5060156b5dbfcc0b2a63134

  • SHA1

    3c967b82bb4e3d62c0eff4a61d367878e3d911d1

  • SHA256

    4ba9b799b02be4e2ebe6ba8e5354e59884b63217ded0de536053858dea21e553

  • SHA512

    fd51b1641f5f4c3078c1bcc4901c2731d04ef7c222fd0cea9dd19c30f6ce7962c89c8117fb9ff8838bba494e1a9e27e25813ce7d56ae54c9287ae01cbe44caf5

  • SSDEEP

    6144:g50gUCUSINdOHRtKwXPbNsiRlrUEX5eFmM:i0gid6tbPbOiRlrUEX5eFmM

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\uninstall.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\uninstall.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\$TEMP\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    273KB

    MD5

    ac49750ef5060156b5dbfcc0b2a63134

    SHA1

    3c967b82bb4e3d62c0eff4a61d367878e3d911d1

    SHA256

    4ba9b799b02be4e2ebe6ba8e5354e59884b63217ded0de536053858dea21e553

    SHA512

    fd51b1641f5f4c3078c1bcc4901c2731d04ef7c222fd0cea9dd19c30f6ce7962c89c8117fb9ff8838bba494e1a9e27e25813ce7d56ae54c9287ae01cbe44caf5

  • \Users\Admin\AppData\Local\Temp\nsy15C3.tmp\FindProcDLL.dll

    Filesize

    27KB

    MD5

    6f73b00aef6c49eac62128ef3eca677e

    SHA1

    1b6aff67d570e5ee61af2376247590eb49b728a1

    SHA256

    6eb09ce25c7fc62e44dc2f71761c6d60dd4b2d0c7d15e9651980525103aac0a9

    SHA512

    678fc4bf7d345eeb99a3420ec7d0071eaba302845e93b48527d9a2a9c406709cc44ec74d6a889e25a8351a463803f8713a833df3a1707a5ad50db05240a32938

  • \Users\Admin\AppData\Local\Temp\nsy15C3.tmp\KillProcDLL.dll

    Filesize

    4KB

    MD5

    99f345cf51b6c3c317d20a81acb11012

    SHA1

    b3d0355f527c536ea14a8ff51741c8739d66f727

    SHA256

    c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93

    SHA512

    937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef

  • \Users\Admin\AppData\Local\Temp\nsy15C3.tmp\System.dll

    Filesize

    11KB

    MD5

    959ea64598b9a3e494c00e8fa793be7e

    SHA1

    40f284a3b92c2f04b1038def79579d4b3d066ee0

    SHA256

    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

    SHA512

    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

  • \Users\Admin\AppData\Local\Temp\nsy15C3.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    d16e06c5de8fb8213a0464568ed9852f

    SHA1

    d063690dc0d2c824f714acb5c4bcede3aa193f03

    SHA256

    728472ba312ae8af7f30d758ab473e0772477a68fcd1d2d547dafe6d8800d531

    SHA512

    60502bb65d91a1a895f38bd0f070738152af58ffa4ac80bac3954aa8aad9fda9666e773988cbd00ce4741d2454bf5f2e0474ce8ea18cfe863ec4c36d09d1e27a

  • memory/852-23-0x0000000010000000-0x0000000010003000-memory.dmp

    Filesize

    12KB

  • memory/852-38-0x0000000000400000-0x0000000000644000-memory.dmp

    Filesize

    2.3MB