Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 20:38

General

  • Target

    install_flash_player.exe

  • Size

    1.8MB

  • MD5

    a281d68f8ae56f0fb3971df7dc6e4e26

  • SHA1

    f1df1ab84b61e7f2c3eea0a959d2115dd001816b

  • SHA256

    9305e0c413dd8045f7a9f62578849f903431ed6d3b2cb1d3ca59b082360d2e00

  • SHA512

    855ddcdc0124ecd350d13d6174d2a6aeeede565cfe3afaa3df015f82049ebb74eb21047f334194626a215e78c6f81b053f83029171b68ba82795f92293e21643

  • SSDEEP

    49152:1ZjrU2pjuIOVIzMiJZLT1tMQ5IrqNUN3PU2wm1kuqE5+vxFLdMk:njr1qIzpJZLT1tbGqNUhM2w5uq5vxFLR

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\install_flash_player.exe
    "C:\Users\Admin\AppData\Local\Temp\install_flash_player.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsjD7CB.tmp\NSISArray.dll

    Filesize

    17KB

    MD5

    2b8574f6a8f5de9042baa43c069d20ba

    SHA1

    07959da0c6b7715b51f70f1b0aea1f56ba7a4559

    SHA256

    38654eef0ee3715f4b1268f4b4176a6b487a0a9e53a27a4ec0b84550ea173564

    SHA512

    f034f71b6a18ee8024d40acd3c097d95c8fd8e128d75075cc452e71898c1c0322f21b54bd39ca72d053d7261ffbab0c5c1f820602d52fc85806513a6fe317e88

  • \Users\Admin\AppData\Local\Temp\nsjD7CB.tmp\System.dll

    Filesize

    10KB

    MD5

    16ae54e23736352739d7ab156b1965ba

    SHA1

    14f8f04bed2d6adc07565d5c064f6931b128568f

    SHA256

    c11ffa087c6848f3870e6336d151f0ba6298c0e1e30ccddf2da25a06d36a61fc

    SHA512

    15dbfcdc5dc34cb20066120045e3250f8df9e50b91de043f2ada33ac0235907d98668e248828a7ed9c75e25dfb5103b7248867530ce73ee36f6a35c30b4afa9f

  • \Users\Admin\AppData\Local\Temp\nsjD7CB.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    68d73a95c628836b67ea5a717d74b38c

    SHA1

    935372db4a66f9dfd6c938724197787688e141b0

    SHA256

    21a373c52aaecce52b41aebe6d0224f53760fc3e5c575e821175eee3a1f7f226

    SHA512

    0e804deab4e647213132add4173c1d2c554c628816f56e21e274a40e185d90254e29c8bfc6fbfdfea2a492d43d23c0bfa4b276252a3f5e1993ab80ff832c4914

  • \Users\Admin\AppData\Local\Temp\nsjD7CB.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    05450face243b3a7472407b999b03a72

    SHA1

    ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

    SHA256

    95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

    SHA512

    f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b