Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 07:24

General

  • Target

    f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe

  • Size

    29KB

  • MD5

    87eac925801bd9819d91eb39133fe001

  • SHA1

    748f0b0626667268eb7a0f4bc38ec7a61b2e0ec6

  • SHA256

    f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622

  • SHA512

    f1d809a24102082d63bc8e61ea533af6310a5ed11be68e2e61a7f4e7a16add47f614180c14c9487b3ae3d417f83d18e003142a330df307169c222d44db188f30

  • SSDEEP

    384:dUJ8s1g8ssAi6D9VIt13vfdHldhwLGEGi+OGa0Mr8SmM:SasbLAiict13vfdHldhwyEr+OGa0MrV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe
    "C:\Users\Admin\AppData\Local\Temp\f2a6cbf1946365978eed4bbb5d34970a6933e04034fcbf32f5bd76ff39231622.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\ppl32.exe
      "C:\Users\Admin\AppData\Local\Temp\ppl32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ppl32.exe

    Filesize

    29KB

    MD5

    3cc5c96645290cc6dc3f42917e5de4f6

    SHA1

    c20d681c6438b717380673fc789c7c7d1fb92643

    SHA256

    05c57099c1f1a43131f1909e2c022f2ca61abd154aa5f6de473e729ce411fbeb

    SHA512

    c4def095f29f7c118d5808f14906aab9d6c62f8c2e76de0d13032e6a62b327c372df8579d4496b10cf85b2768ffbc786afec9fb95bb6677ec83473fbccd21011

  • memory/1408-20-0x00000000004F0000-0x00000000004FA000-memory.dmp

    Filesize

    40KB

  • memory/2360-6-0x0000000001B40000-0x0000000001B4A000-memory.dmp

    Filesize

    40KB

  • memory/2360-0-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2360-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB