Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 02:37

General

  • Target

    3be2f73e86582b17df09eb72d94e2a90N.exe

  • Size

    932KB

  • MD5

    3be2f73e86582b17df09eb72d94e2a90

  • SHA1

    5b5fbe55e9ca0b194d61c77049685920cc2532c5

  • SHA256

    d58f4f306f1c64374f063d9ea11c16d75208c6c32bc6b0f0877e2bec01f3f939

  • SHA512

    551a95e711b46ec4aea2451a11bf188d96ffe6423f27c7327f6d3e4d1f234c80600211ffc126e15d73eef338129300f7012e06195c9fb708c0dae44dea55e76c

  • SSDEEP

    12288:71/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdXZRwUTg2mhv:71/aGLDCM4D8ayGMZo8/7b82mdSM+sOe

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3be2f73e86582b17df09eb72d94e2a90N.exe
    "C:\Users\Admin\AppData\Local\Temp\3be2f73e86582b17df09eb72d94e2a90N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\ProgramData\pqpcg.exe
      "C:\ProgramData\pqpcg.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache .exe

    Filesize

    932KB

    MD5

    32173dd4f439a56831c5c03e6f8b107a

    SHA1

    07167ee3d0486598d33a8d20bacd08dced58bbf4

    SHA256

    5eb269aebcc5880343b703c25eb5d15cd08e2d84147edf8b9df530886bb6b2ca

    SHA512

    7c01e4dd896e212f8b11283d5322bcbf9e4f35fabf8a38bfc9e0162b4f8085c7cea62ed2dc3532ad67c053e8643056c750c903e5ad39fd4ea198dc8e4c1c74b1

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    71e38cb8371fa644436922e0eee6040d

    SHA1

    6e9e897cb95fd8434891e87a584f5f1b9482cae2

    SHA256

    2c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4

    SHA512

    852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be

  • C:\ProgramData\pqpcg.exe

    Filesize

    454KB

    MD5

    f36e72af8af31abd7f76e1144089af6b

    SHA1

    0e753f0fd424d48c5e9d4e6f9e4a6c90142af7a2

    SHA256

    86cfccdd7e937ad4138365919730ed69a1d5e413f4c71625b9b8c9f89e6a7bcf

    SHA512

    0fda38d751a6c68a533a8f65cfe352709fdf5a5fe2621bcd311102980678b895433afd2ff6e6a71a1f68b63d816119713d51c766921deb976190185d4fe272c8

  • memory/2812-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2812-12-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2952-143-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB