Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 22:11

General

  • Target

    682f25aeb2aa1a41707794d3ad77dee0ea2f31b3c53899914f26e6d4e45478c6.exe

  • Size

    284KB

  • MD5

    7529434768151e05538ccf2d097b0ecb

  • SHA1

    243040045fe8c8a2cea6a119eb234b9b1216db48

  • SHA256

    682f25aeb2aa1a41707794d3ad77dee0ea2f31b3c53899914f26e6d4e45478c6

  • SHA512

    d16101d50427a14bea24fed5647014e7e8ea1051a5a45106dc6e8c3962edba36ed8fb6f0cfd19f6188fe362330ea0d60cb2e4567613b9e7c276e23a858afce95

  • SSDEEP

    6144:ztvBPnU1b7e9SQii1EkoNlhlrQ2ZrM2x//aC9KpytQEcCC1:Zv1nWdQP1EDhZPxaCIp2Ncb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\682f25aeb2aa1a41707794d3ad77dee0ea2f31b3c53899914f26e6d4e45478c6.exe
    "C:\Users\Admin\AppData\Local\Temp\682f25aeb2aa1a41707794d3ad77dee0ea2f31b3c53899914f26e6d4e45478c6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Program Files (x86)\Microsoft Build\Isass.exe
      "C:\Program Files (x86)\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2344
    • C:\Users\Admin\AppData\Local\Temp\DW_682f25aeb2aa1a41707794d3ad77dee0ea2f31b3c53899914f26e6d4e45478c6.exe
      "C:\Users\Admin\AppData\Local\Temp\DW_682f25aeb2aa1a41707794d3ad77dee0ea2f31b3c53899914f26e6d4e45478c6.exe"
      2⤵
      • Executes dropped EXE
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DW_682f25aeb2aa1a41707794d3ad77dee0ea2f31b3c53899914f26e6d4e45478c6.exe

    Filesize

    64KB

    MD5

    a32a382b8a5a906e03a83b4f3e5b7a9b

    SHA1

    11e2bdd0798761f93cce363329996af6c17ed796

    SHA256

    75f12ea2f30d9c0d872dade345f30f562e6d93847b6a509ba53beec6d0b2c346

    SHA512

    ec87dd957be21b135212454646dcabdd7ef9442cf714e2c1f6b42b81f0c3fa3b1875bde9a8b538e8a0aa2190225649c29e9ed0f25176e7659e55e422dd4efe4c

  • \Program Files (x86)\Microsoft Build\Isass.exe

    Filesize

    213KB

    MD5

    55d43211ba2fc070c2b14d6d87809b44

    SHA1

    5da380652eb9d3295a4e87c5864774a8d4bbccd7

    SHA256

    ae860675c711800b39052740d86af278a77bebb701ea64e48df795e492374710

    SHA512

    f59f1551173200049888dc24cea4c91a58c93e6cd17c01207005c7017db52af7db756e3ce71f4688ec051353d641c7107e76554e1fc6451a0193265f9578a243

  • memory/2344-44-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-34-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-60-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-50-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-23-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-24-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2344-25-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-26-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-27-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-28-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-33-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-49-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-37-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-48-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-45-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-46-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2344-47-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2348-8-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2348-13-0x0000000004390000-0x0000000005637000-memory.dmp

    Filesize

    18.7MB

  • memory/2348-22-0x0000000000400000-0x00000000016A7000-memory.dmp

    Filesize

    18.7MB

  • memory/2348-11-0x0000000004390000-0x0000000005637000-memory.dmp

    Filesize

    18.7MB