Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 02:20

General

  • Target

    c0d5c8d7e71985db3a9fb040e14ff8643f3f180145fbb6c07ba85aec9fd517c8.exe

  • Size

    29KB

  • MD5

    2ce6284e2a130c7bb5bed33844120d83

  • SHA1

    a9238b52e534546be54ba823178270e4996bbad2

  • SHA256

    c0d5c8d7e71985db3a9fb040e14ff8643f3f180145fbb6c07ba85aec9fd517c8

  • SHA512

    9e2d65694a91ca1af118527f29b70c77088664d97b87874d1f6fba013b20b588b8c5a86c6bc849e1145a703e54803e53e2124eb2324a1ec4e9b8b5352e64f61e

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Tq:AEwVs+0jNDY1qi/qO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d5c8d7e71985db3a9fb040e14ff8643f3f180145fbb6c07ba85aec9fd517c8.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d5c8d7e71985db3a9fb040e14ff8643f3f180145fbb6c07ba85aec9fd517c8.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78d29cce31134d907a51a4234a153df4

    SHA1

    42390caa06db4f3dad8f4ecc71c1faafa5cd08cd

    SHA256

    cd9ecd3ab82f6000cdc0dcdf42ad58f272f92c7f7472065c868b91319eec3816

    SHA512

    4158c352a6b5082ee6201d5c3d4838bfcc8ffc12dd6d338b755a4c013b67baa2394dd9fdffb954b2654a6f0cf01ca270369d0d279e9b76c76ee2a4d5dd85ca0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    408fe12da8c37e1f55798e376dff13c9

    SHA1

    06bd311da5434dbddec1ff44d1dc25356c2ad2ba

    SHA256

    a5235943c965aa4779c90263275bf2e921d139fb52dc6afcd83ded93c61e08f9

    SHA512

    bf2f8752cf861bfa509e868b3514afd37be78ec1c1a9eb3e8f921f9d0001ce2f471faf4ac3214d70d003b3e02143ad792463ccc38da4d0c1dc89b75152b5aa6d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0E1IWGZ4\search[2].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0E1IWGZ4\search[6].htm

    Filesize

    168KB

    MD5

    9e2f303b2a54ecf8b7402068e50e6a91

    SHA1

    4a5bdc54fe717ec80607dd29f21061951382107f

    SHA256

    2330f325ec0690785cc804d689769e5a424859e2380f511817ef90c76e3392ca

    SHA512

    570bd04c4ebf58ff591688694d7506e2fab5cbf3a285d7d41af3a14f1e5b406828e6a7d2b06842c66b97e3b6f0cdf04f36d4d9de0d38df3ff733d550e84aa4b9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\TNSKDNVH.htm

    Filesize

    175KB

    MD5

    b889c77f6781de2b8f0b232b139e0d2f

    SHA1

    b0fd4e4687bfd2d194ff35ee8b46be683b34a79b

    SHA256

    9172bfae5fc91035b191f093cbde321db6bf6055f7f2774ffafc2791217a29d5

    SHA512

    032f4d4ffe087731e3a793680b2b7499054e7e03fbe7bdc867f5c91f9d1c635e30a4c89912780cf9f14030b813760d0dc177ae1bb0fc6811594a376bfc701443

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WHDSWW5V\E27YICM2.htm

    Filesize

    175KB

    MD5

    00591bb0e5c8dc40c856cc2b2c413a98

    SHA1

    2aac2de68d098001b0f5876528f456dddd71b68f

    SHA256

    3abf824b942810175b66d0181508217096a8261e342816ba5631f7fa4fe1eb15

    SHA512

    b72a60b91e14bd80bbca6d9b57f2f8ed4cd21076c28276910e1d074656887f04e350a2bca4c651cdf16c57632bad58db40a58538379fbddaa717ae8a6b0f3423

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WHDSWW5V\results[2].htm

    Filesize

    1KB

    MD5

    211da0345fa466aa8dbde830c83c19f8

    SHA1

    779ece4d54a099274b2814a9780000ba49af1b81

    SHA256

    aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5

    SHA512

    37fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca

  • C:\Users\Admin\AppData\Local\Temp\CabE173.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE185.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmpE034.tmp

    Filesize

    29KB

    MD5

    2ce6284e2a130c7bb5bed33844120d83

    SHA1

    a9238b52e534546be54ba823178270e4996bbad2

    SHA256

    c0d5c8d7e71985db3a9fb040e14ff8643f3f180145fbb6c07ba85aec9fd517c8

    SHA512

    9e2d65694a91ca1af118527f29b70c77088664d97b87874d1f6fba013b20b588b8c5a86c6bc849e1145a703e54803e53e2124eb2324a1ec4e9b8b5352e64f61e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    384B

    MD5

    d3673f396e57e7624f93fee9ed32d2d3

    SHA1

    3f214015ab1c1c562ea6086807513dbaa83b37de

    SHA256

    d7f07e5911a646b30bce31dd801f784eb7a364ea15760c6c8e101a01c5192ced

    SHA512

    a6a94adef83d98fc067e1ec8304a92335e50c7e7044612cf42fb93b5c8c89e2a46798e86b27c679697cf80f6e64245d425fcd607f08ce5288d62a74e739f13ca

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    384B

    MD5

    3cca96a86b9ca50091c4cd5f60e74dae

    SHA1

    9e6ee5f2e72fd48e1a3798d666494e6d22702804

    SHA256

    56b006d2e982413d12647a5200f64b9e5396882c87d1f5466d80aae3cd55e81e

    SHA512

    1a8618cd565e3eaa3c57423bb053690074ce4277228eeff64869821a151ae359bfed3d351b9bbe76cfb97387aa19e9dfe29f6debac2d7d8421b6f469cef0359f

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    384B

    MD5

    3fb3a24cdfd37d74a1958edf5084dda3

    SHA1

    ddb529b9d970560457da8dc4f8e809d3c8be91a4

    SHA256

    43becdc4a83773a89e3b008f2090686f0ef104c67c40e7f6be102a46216bf934

    SHA512

    f8c77f879f09cf5bcbfbc9fa951032dbbd78a955e09879c7e160e31ea0b5f249162cec35203e120194342d7e58702d986ba7c8d3bb4c963de0ac8903962a2cc6

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2680-63-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-2-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-59-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-17-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-35-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-57-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-70-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2680-75-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-506-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-80-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2680-287-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2736-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-81-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-76-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-69-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-64-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-60-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-58-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-288-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-23-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-507-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB