Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 20:22

General

  • Target

    39e7d258a6f1dc38e7a3715788be486cb78c774a3db59c41e3e7a1d2048c8db9.exe

  • Size

    29KB

  • MD5

    2e44355a41c2cf29f749f39907916170

  • SHA1

    2f77500d21ca488077ee29d55f2b0e3a454ecdc1

  • SHA256

    39e7d258a6f1dc38e7a3715788be486cb78c774a3db59c41e3e7a1d2048c8db9

  • SHA512

    7432c98e0aed021ec47645df1e1da4c1b1ada7a99c7e291d97efe506c135e8c71c95062113b5e0928fc36e8ef9a29da0500ea0881783119a3b6ed51983f1828d

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/+:AEwVs+0jNDY1qi/qG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39e7d258a6f1dc38e7a3715788be486cb78c774a3db59c41e3e7a1d2048c8db9.exe
    "C:\Users\Admin\AppData\Local\Temp\39e7d258a6f1dc38e7a3715788be486cb78c774a3db59c41e3e7a1d2048c8db9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpF882.tmp

    Filesize

    29KB

    MD5

    026ab2c602c844909a61c1f9ead2c085

    SHA1

    cdf4fc9065d096a4a90ba9434c4a155ed9affc88

    SHA256

    cc2a0cd67c00729fbf9a8a5cc595be59c5fcee6a4bfa71610c2bdfe1a56fd233

    SHA512

    580d656c017f86c321a08727a38aea7746055e0699cb5c68c70dc6c2c9ff5a94173e1356878f8442565c5e9a901058dd97486c7ec806335eced63f520489a89c

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    a0b5398dca4eb684990546d7e51eb58e

    SHA1

    61d34da9815f5564a20932f5ec2d8967070d7e75

    SHA256

    24cf644ecb2d391e2be891f24eba92f512500eb6361dcdf952b1229c2482be4b

    SHA512

    77abc3d3c16cab2745c7b43e7723d4ba62c4c0e3c977c840ebbce5a7af0a83cc9f779e84628407b44c26d4d1925d89af88dda3259efbba9c60524a37aa90a3bc

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1564-22-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1564-4-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1564-17-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1564-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1564-53-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1564-77-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1564-25-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1564-75-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1564-70-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1564-87-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1564-8-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1564-55-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2320-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-49-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-54-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-44-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-56-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-76-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-78-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-83-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2320-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB