Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 23:53

General

  • Target

    8718db6db75b3d30c76dbe0e15dede1702ec0c70bac6951116760716379bf694.exe

  • Size

    135KB

  • MD5

    234c42cd600b79f965922e16c5abb110

  • SHA1

    93eaecfe145d6b7d3ec1e93bee606d1f40dd953f

  • SHA256

    8718db6db75b3d30c76dbe0e15dede1702ec0c70bac6951116760716379bf694

  • SHA512

    51e648032c49349c80e031e6b533bafad42a6587603e31bc102e466c9d7e2030fcfb5252e20b2c5a5620f5e49240a06fdf0c3cace9b4842b2552c8964197d6f3

  • SSDEEP

    1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOjq:YfU/WF6QMauSuiWNi9eNOl0007NZIOjq

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8718db6db75b3d30c76dbe0e15dede1702ec0c70bac6951116760716379bf694.exe
    "C:\Users\Admin\AppData\Local\Temp\8718db6db75b3d30c76dbe0e15dede1702ec0c70bac6951116760716379bf694.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\ProgramData\Update\wuauclt.exe
      "C:\ProgramData\Update\wuauclt.exe" /run
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2320
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\8718db6db75b3d30c76dbe0e15dede1702ec0c70bac6951116760716379bf694.exe" >> NUL
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Update\wuauclt.exe

    Filesize

    135KB

    MD5

    a9389bac0c93e5c03be74359372afe4d

    SHA1

    3ddd01f1a75f9fcc5287278c296081517c71d030

    SHA256

    335e9498e7391f4823137213c196676c243a55b0552391669b89358d2dcc15db

    SHA512

    114e120c71b123f49e2195377eca18dc6c89081795cd7508879978ebe64bb5837498df4ade43c4a1442fdd38e6c2f22a5eabdcf81b2847848c77ab5b5f7a9660

  • memory/1624-0-0x0000000000FB0000-0x0000000000FD8000-memory.dmp

    Filesize

    160KB

  • memory/1624-4-0x00000000000F0000-0x0000000000118000-memory.dmp

    Filesize

    160KB

  • memory/1624-7-0x0000000000FB0000-0x0000000000FD8000-memory.dmp

    Filesize

    160KB

  • memory/1624-9-0x0000000000FB0000-0x0000000000FD8000-memory.dmp

    Filesize

    160KB

  • memory/2320-8-0x0000000001020000-0x0000000001048000-memory.dmp

    Filesize

    160KB