Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 00:15

General

  • Target

    killer_rodog.exe

  • Size

    669KB

  • MD5

    cfee92888fcda67c350f8a5d707fee0b

  • SHA1

    707c165c89d32a1815b6a916a8ea0822dc532d16

  • SHA256

    997016a716703cb27e9cad923a17ed42bc5372117f19342c4f96e102906ad7c2

  • SHA512

    965ed490baa8b4110db3f3dd830b02296deae97a78646c2ff4117ee501a97b9d58456999f31831ea369e7f6b3e645f97eee8a32bdcff8221791f6fdb2fd4d813

  • SSDEEP

    12288:U1oDL47qTOkMRX7L3RIVcnYI1NK/3K2OXA0/pkDd8J4FmWRH56AIxd15IOmtamK5:UbIGvKur1w/K/Q0/puaFm6AOdb9mEm

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\killer_rodog.exe
    "C:\Users\Admin\AppData\Local\Temp\killer_rodog.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    PID:1752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1752-0-0x0000000000400000-0x00000000005D5000-memory.dmp

    Filesize

    1.8MB

  • memory/1752-1-0x0000000075014000-0x0000000075015000-memory.dmp

    Filesize

    4KB

  • memory/1752-2-0x0000000075000000-0x0000000075110000-memory.dmp

    Filesize

    1.1MB

  • memory/1752-3-0x0000000000400000-0x00000000005D5000-memory.dmp

    Filesize

    1.8MB

  • memory/1752-9-0x0000000000400000-0x00000000005D5000-memory.dmp

    Filesize

    1.8MB