Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 00:01

General

  • Target

    01a01670e8afbfeef2a2e81f7553ba239ee1e97891d4e019fff86ee5818c7043.exe

  • Size

    1.6MB

  • MD5

    33abf90163eebf23b75e2877fdc38960

  • SHA1

    a00171ada9b7c63b1a48179443885635f0f20008

  • SHA256

    01a01670e8afbfeef2a2e81f7553ba239ee1e97891d4e019fff86ee5818c7043

  • SHA512

    d8bad79fecd8dbc19b75d75893c71d5edb7dd7763b01ac37942fbf94dc04bfe5e2bd7f1a380b75bd1d036c99f16698d13f2f4973442aa733138abde08cba9054

  • SSDEEP

    24576:Q0MpIg8RLbWpFfA5HFezJUptJVYJgnBNfr9BJLOqmu3yVg+VkXF:Q0CEezebhnBpr7JLOqmu3yg+VA

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01a01670e8afbfeef2a2e81f7553ba239ee1e97891d4e019fff86ee5818c7043.exe
    "C:\Users\Admin\AppData\Local\Temp\01a01670e8afbfeef2a2e81f7553ba239ee1e97891d4e019fff86ee5818c7043.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\SysWOW64\cacls.exe
      cacls "" /e /p everyone:n
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3068
    • C:\Windows\SysWOW64\cacls.exe
      cacls "" /e /p everyone:n
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f76f2e7.tmp\data.ini

    Filesize

    1KB

    MD5

    9d093674b80ed207ceb92c59de8d5a92

    SHA1

    f26f7ed8b7e8a930531b1d96649e53f0f7aaeadd

    SHA256

    683c4bbb85359ae25d7c473cb5c5cb80be72beea2b0e207594208765d98455f4

    SHA512

    c05d123dc1a76275a61dd7e5a54bb2c73d78648c46ea1146d710250713e6b71f27d4dadd70b9bacd514eb8f9f3152e94ffb1797f8179d48cdae130b69a0c2809

  • C:\Users\Admin\AppData\Local\Temp\f76f2e7.tmp\data.ini

    Filesize

    1KB

    MD5

    a12f8b132978d0c68a813cc441d8ca4c

    SHA1

    222025325e972dfcc6f94d12baadb3334e138e70

    SHA256

    cea6158cde1c817fb56430a465399973a9a310f9c205b49ecce2cc3072b8c8fd

    SHA512

    9ce2b680fa9df9f9adac5af2407495ace5acb352193f0daf7d0ec219048c732b030dc533194a98a5baec085dc044aca58ae64bb6244635338e54c52b68281d56

  • C:\Users\Admin\AppData\Local\Temp\f76f2e7.tmp\variable.ini

    Filesize

    761B

    MD5

    21fa746f8d554d0f4fd1257bb77fed19

    SHA1

    ef818ec6f9d54b9df90fc1e18fe795f76b22e0de

    SHA256

    f9834c6a2bde77599fc0df69d74d020d12b865de31176a48ad4404809ead8379

    SHA512

    cb6c743b07f31ec5611ef332de1b4fdd1f874a2cb024b5a359226df53616b5f329a72b896b8be4f8292d43bc563115ecc9fd35a697f050c17cbb7392dabaf4a2

  • \Users\Admin\AppData\Local\Temp\7-zip32_2.dll

    Filesize

    233KB

    MD5

    ea3df059beae86a3e186b2b179755e77

    SHA1

    babdcd6b5082c02fa2f5ebc2020f2cb3bbd77e8d

    SHA256

    1ab68a0c296281437fe638c8535309c6241ded4852608d940f5efcb8cc2d91a6

    SHA512

    1406d8083cfbd26e18aba74f6b45a09137bb3960f7afce5c5d0d790b0edb7277b7b885ed2ded9def12b667bcb37cbfb335884b2d7b8f08565743b674d1f053bb

  • memory/2636-7-0x00000000765D0000-0x00000000766E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2636-6-0x00000000765FD000-0x00000000765FE000-memory.dmp

    Filesize

    4KB

  • memory/2636-1-0x0000000001F70000-0x00000000020F8000-memory.dmp

    Filesize

    1.5MB

  • memory/2636-8-0x00000000765D0000-0x00000000766E0000-memory.dmp

    Filesize

    1.1MB

  • memory/2636-5-0x0000000000440000-0x0000000000458000-memory.dmp

    Filesize

    96KB

  • memory/2636-14-0x0000000002A70000-0x0000000002B0F000-memory.dmp

    Filesize

    636KB

  • memory/2636-2-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/2636-3-0x00000000021B0000-0x0000000002351000-memory.dmp

    Filesize

    1.6MB

  • memory/2636-0-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/2636-148-0x0000000002A70000-0x0000000002B0F000-memory.dmp

    Filesize

    636KB

  • memory/2636-149-0x00000000021B0000-0x0000000002351000-memory.dmp

    Filesize

    1.6MB