Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 15:19

General

  • Target

    HA_KingdiaDVD2Zune1.513_LRH.exe

  • Size

    4.5MB

  • MD5

    12594eee927981c4800e90a047e2a044

  • SHA1

    ee8e851c66b8a27d96496205f3b791a2fa6ed21c

  • SHA256

    fbb5de50fc57b212a99ef247df53a6ad6b58d9c9207c7105abb3c84b08f87233

  • SHA512

    79d36ff48609b0a28cb9fff0bbb2350f5349889ed616165342932215b7c19d67cede03a247446a583e433898f8145e10181d2b4231106595f30d61101466c82e

  • SSDEEP

    98304:/y4XF0uD8kg0mFcaZ1qUoc8ClZmDw5k5mMWqjwzfPA8:PFJ20u3qZClf72wzXn

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HA_KingdiaDVD2Zune1.513_LRH.exe
    "C:\Users\Admin\AppData\Local\Temp\HA_KingdiaDVD2Zune1.513_LRH.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsoA99A.tmp\ioSpecial.ini

    Filesize

    684B

    MD5

    93c3940553c2bf5e5cd0c7ce57b7f6cc

    SHA1

    070816eaa6bc64c3be90db7525acc99d2c0659b4

    SHA256

    98d47664d802de77ea7146e86c28ee76914642856b3bb3474f1df911abc0bc94

    SHA512

    cc7c4b57f6536004703791627fb316580c963809fc96d471cde84be6d1537ec4a59c108677bd3bb6dd40d58ba075d3fc6038b69a0b63e90055434a0640b6cc1d

  • \Users\Admin\AppData\Local\Temp\nsoA99A.tmp\InstallOptions.dll

    Filesize

    12KB

    MD5

    83304a78d2b6ea45ea8404f4cd78721f

    SHA1

    d5c5d19653c751c08579dd094bcc9fef1841af00

    SHA256

    92344973083c0a5d8f5732814c1315124e8e0a2f1ed912583a081f95f7549414

    SHA512

    94076cc935927925641d668c19b389d007ff7e8623f2afe706fc73d1ecb97210577a828a727404b200d9870e14b23d6bd047de9201d629e7443a929c0740c67e

  • \Users\Admin\AppData\Local\Temp\nsoA99A.tmp\brandingurl.dll

    Filesize

    3KB

    MD5

    9c3488b5e9655d1837c3963ecec33f70

    SHA1

    f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3

    SHA256

    05ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a

    SHA512

    6af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7

  • memory/2988-0-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/2988-89-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB