Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 00:52

General

  • Target

    99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe

  • Size

    92KB

  • MD5

    aa0309f312fabff45c637ea7b15a6746

  • SHA1

    49dceca4afbc66a45168859737c6cef2b7712fa9

  • SHA256

    99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36

  • SHA512

    5a881f85eca17d82345281069a20c52df4493da5ce7c7a6642c3332c173054dbacbc58533dc96053e01aa47316685d7fd17dc3f75691cf842893db2ea04b1283

  • SSDEEP

    1536:R7PvnKhWQtC3Izj6TrlDa2z6Ewd0zvPTQw9LBZRQ8V3zhb:hPvKztiIzj6xtDLBZRQ8Vj5

Score
9/10

Malware Config

Signatures

  • Detects executables packed with eXPressor 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe
    "C:\Users\Admin\AppData\Local\Temp\99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s C:\Users\Admin\AppData\Local\Temp\259399585.reg
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Runs .reg file with regedit
      PID:2872
    • C:\Windows\SysWOW64\WinHelp85.exe
      C:\Windows\system32\WinHelp85.exe kowdgjttgC:\Users\Admin\AppData\Local\Temp\99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:2044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\259399585.reg

      Filesize

      384B

      MD5

      ab40dcd38d384995cac67aaa7d988438

      SHA1

      9a79887df54e359e6b8ed6de3dae122f0e88ee12

      SHA256

      99d34009a80e74b612ce8e09a910394e905aead8b622365e50c83d690e1439f0

      SHA512

      c68526a36b959df6cb4a3b4f49cd642b7786c202cb063cafff7c9dec0751abd44e00f717d33ec0fdcdc6dc465f657ca66b8546027597557dc1b36e7d9b4cdc5e

    • \Windows\SysWOW64\WinHelp85.exe

      Filesize

      92KB

      MD5

      e4e8c41a704ce64f6cfafd95e46a0131

      SHA1

      ef2524da1f6249e19ffb6a85cf3e87aed360d664

      SHA256

      44f6b54bda1b95b04aefaaaf5b0106e85bc6bfdceed3fc2bf1e4cd3bbc46865f

      SHA512

      5c7f1f48f3dccb7271c63439a6f9195a4d437894eefee4991a3379ef2165cda494e1659de39a7d5fc7c7bed8cac37d807d368445bdd9019623f4fe0750c8d8b9

    • memory/2044-12-0x0000000013150000-0x0000000013167000-memory.dmp

      Filesize

      92KB

    • memory/2044-10-0x0000000013150000-0x0000000013167000-memory.dmp

      Filesize

      92KB