Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 06:38

General

  • Target

    5e2e15021cbe792e303d713175bebc40N.exe

  • Size

    241KB

  • MD5

    5e2e15021cbe792e303d713175bebc40

  • SHA1

    c8eb771df2ca8098910952a9efd5a73fb713107c

  • SHA256

    d2f2ef1d181c977cdbbaf7853430062cdba5b14445a533dd63813a4a939aa86d

  • SHA512

    e90a3573f4d0a247d1d344ac33144d9a0542295aad600328bdada230efbcdffba164a8602ad94c5f16e6958980cdee502d58455d3cf97be2a68d9baf9dc932ff

  • SSDEEP

    6144:TfL+oqZk4prAN+O/LE11c7ojuZUvyejrRZ:TfLikBg11GojuHefRZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e2e15021cbe792e303d713175bebc40N.exe
    "C:\Users\Admin\AppData\Local\Temp\5e2e15021cbe792e303d713175bebc40N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2152
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2816
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2736
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2660
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2696
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2112
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2468
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2484
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1324
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2132
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1148
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2996
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2248
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1708
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2064
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2596
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1672
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:584
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2024
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1500
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1576
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2396
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      PID:2884
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      PID:2752
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      PID:2736
    • C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe
      "C:\Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe" /mute "Microsoft Edge WebView2"
      2⤵
      • Executes dropped EXE
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsuF143.tmp\System.dll

    Filesize

    12KB

    MD5

    4add245d4ba34b04f213409bfe504c07

    SHA1

    ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

    SHA256

    9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

    SHA512

    1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

  • \Users\Admin\AppData\Local\Temp\nsuF143.tmp\angolans.exe

    Filesize

    139KB

    MD5

    fda656c75b581d0dce6537d159052bcd

    SHA1

    a06523896f54e51a1a7269356634cc0bbb069edd

    SHA256

    4ce66c1b06bab37a85a93c5e7d7c9ba6f79da608fab33a00c44b8b0a9443309d

    SHA512

    8e7928c0e0439da880b7f2b036aa4f89cabb365bfe83c17184336580101c96d3b1f2c2ddc254a99a73d7cd0e203c40a1b22f68ad803070d2537c82fb95718106

  • \Users\Admin\AppData\Local\Temp\nsuF143.tmp\doges.exe

    Filesize

    189KB

    MD5

    9101a7f1e09281d413ece6d825020d92

    SHA1

    9df34287601a77e65cec58843474108dd0309f54

    SHA256

    781c6b118a97dd0301788d1882b18242d2768ad40752cb622f70e80d7e3a0a88

    SHA512

    8f3e5068f47817593ddd3eeb48848a1a49ffbb62fbc935c3d90757625ab3aec2e19f34d45b583dbe39dbd5cad11e00e0eb888dda6ffa9952b0851d0ada616425