Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 05:19

General

  • Target

    f64beadb2e68d3c52a8660ed734ee170N.exe

  • Size

    231KB

  • MD5

    f64beadb2e68d3c52a8660ed734ee170

  • SHA1

    138cc8559ede7c70fc2c1c15a97f724b6ffebe2c

  • SHA256

    9b3d37851c46684e6bf14a73eb7bbd87354483e5434ff8c5c62e4f7cfea21572

  • SHA512

    be19cb158b7cdfeac57c6490cba849ff4b51eba4206f1a8d6bbef84e74882a959c1370a3ce1a01b3d9a4efbca09288446e58411fe140ccf90d1e06da35d81144

  • SSDEEP

    6144:uW3I12xMq0tbTSupm1iccN3CeB4TS6s1dbbmJpslZcrbNTtfD3s:rCfq0tbTX4ipSa4O6s1dbbmJKlmrbNTS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f64beadb2e68d3c52a8660ed734ee170N.exe
    "C:\Users\Admin\AppData\Local\Temp\f64beadb2e68d3c52a8660ed734ee170N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\f64beadb2e68d3c52a8660ed734ee170N.exe
      C:\Users\Admin\AppData\Local\Temp\f64beadb2e68d3c52a8660ed734ee170N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f64beadb2e68d3c52a8660ed734ee170N.exe

    Filesize

    231KB

    MD5

    88e983578747d496f5d4ba16895127c7

    SHA1

    eab3a4314a7e294e0407ffc2751fe84b54f0c45c

    SHA256

    aab7f6bd937275a93dd61683e216250d3f74bbbcbbc3740594e57d6275b41b09

    SHA512

    b1c5b97b6da2032f9211878674d54df23c58377336783071780506bf72ee5d7dfbe7c09f2569c882a6b75f6304ea34268c2134d28b59c9f25eccea7b479f8250

  • memory/2356-16-0x0000000000130000-0x0000000000167000-memory.dmp

    Filesize

    220KB

  • memory/2356-15-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2356-10-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2356-17-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2436-0-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2436-8-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB