Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 15:42

General

  • Target

    334427.exe

  • Size

    702KB

  • MD5

    9ed5fe078dd26d80b7ecdd1e92306645

  • SHA1

    13bf74b97add49dc3596b06b072bf3119824cc54

  • SHA256

    ff2f6369b48589ffba42bc5de2ce8cc627c2a87d6b5e54509b42dbf0ef2dd3bf

  • SHA512

    52df7e520dd922ff526597f3a4e806514bd3f2230c5f49faad29072b1bb969ac9c1059356bd75cb6379143c1db975c7e86d27bae66ee50aaf32c7243f55b6590

  • SSDEEP

    12288:6OLi/MOlrpztwdnSocZNsEoDuR3wHebsS6DxxQGc44E:RLi/3lrpztwdusEvjYvLQn4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\334427.exe
    "C:\Users\Admin\AppData\Local\Temp\334427.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\334427.exe
      "C:\Users\Admin\AppData\Local\Temp\334427.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsn33F3.tmp\System.dll

    Filesize

    11KB

    MD5

    17ed1c86bd67e78ade4712be48a7d2bd

    SHA1

    1cc9fe86d6d6030b4dae45ecddce5907991c01a0

    SHA256

    bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

    SHA512

    0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

  • memory/2872-13-0x0000000077078000-0x0000000077079000-memory.dmp

    Filesize

    4KB

  • memory/2872-14-0x0000000077095000-0x0000000077096000-memory.dmp

    Filesize

    4KB

  • memory/2872-15-0x0000000000830000-0x0000000001A84000-memory.dmp

    Filesize

    18.3MB

  • memory/2872-17-0x0000000076FF1000-0x0000000077111000-memory.dmp

    Filesize

    1.1MB

  • memory/4912-11-0x0000000076FF1000-0x0000000077111000-memory.dmp

    Filesize

    1.1MB

  • memory/4912-12-0x0000000010004000-0x0000000010005000-memory.dmp

    Filesize

    4KB