Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 20:10 UTC

General

  • Target

    uninstall_breakaway.exe

  • Size

    90KB

  • MD5

    be4376d46dde21623943a87c1045ead4

  • SHA1

    d5effe6f171173123eb7deeb618701571b34ca7d

  • SHA256

    843dfdb623c613e2b897680b8b6b6265665417fe0ee0f81889ee38d41bd8cabd

  • SHA512

    94f26bea8737fc2435fae5e38a1ae681317608079ed6e57073b6f3db191a2e1d2ff903897bbcad57ca1a0d7c2444e0c6f6da8bf2e65c4390924191d114952d0a

  • SSDEEP

    1536:qpgpHzb9dZVX9fHMvG0D3XJWFBruKIfbmx3sF75Px6:ogXdZt9P6D3XJWFduHfixcF7dx6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninstall_breakaway.exe
    "C:\Users\Admin\AppData\Local\Temp\uninstall_breakaway.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsdD49E.tmp\UAC.dll

    Filesize

    14KB

    MD5

    b7d7324f2128531c9777d837516b65a6

    SHA1

    e15e44fc7c907329e1cd3985e8666b4332f4fa48

    SHA256

    530dc2b26366fc86072487438317a5723a10ff8b38522f9e813df19146a31033

    SHA512

    829fc241cd377de094faf80bb38828c3d877170ca4a3fd85810bc911d2ce38941f8067ef681c21d8bbc04be8a99a3d32b3aec51ae7b32d3a89e5a9d9597ed8d5

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    90KB

    MD5

    be4376d46dde21623943a87c1045ead4

    SHA1

    d5effe6f171173123eb7deeb618701571b34ca7d

    SHA256

    843dfdb623c613e2b897680b8b6b6265665417fe0ee0f81889ee38d41bd8cabd

    SHA512

    94f26bea8737fc2435fae5e38a1ae681317608079ed6e57073b6f3db191a2e1d2ff903897bbcad57ca1a0d7c2444e0c6f6da8bf2e65c4390924191d114952d0a

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.