Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    81s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 21:21

General

  • Target

    2aac8d6e707cada89d6ce7aef65d2170N.exe

  • Size

    668KB

  • MD5

    2aac8d6e707cada89d6ce7aef65d2170

  • SHA1

    0123631fe0642354659d448d53509b503b9c87c3

  • SHA256

    5e7610b4046b3c716fd91db949232cd7127ba3f03f27b2e175e6754acfd61d4b

  • SHA512

    053add31069f078c8f7f076a3ea660bc3bfd3d065946811fbaf3106885b1a022ff6948bd0f40a127b17039a5097df16008407ac9315b509651ba8890c33a339c

  • SSDEEP

    12288:JbZ1hLgoGURlJDHUVQ5zCN2j6FB5WMlL143VQ5zCSjdgEi0kXz:1hLg38lJDHUVQ5zg2mblLO3VQ5zxjdgx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aac8d6e707cada89d6ce7aef65d2170N.exe
    "C:\Users\Admin\AppData\Local\Temp\2aac8d6e707cada89d6ce7aef65d2170N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:708
    • C:\Users\Admin\AppData\Local\Temp\2aac8d6e707cada89d6ce7aef65d2170N.exe
      C:\Users\Admin\AppData\Local\Temp\2aac8d6e707cada89d6ce7aef65d2170N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\2aac8d6e707cada89d6ce7aef65d2170N.exe

    Filesize

    668KB

    MD5

    c618cb6df740f969102e0cc9852d3efa

    SHA1

    ddf17d31ac85f118a3d1eba51e4b8fc6255a85bf

    SHA256

    d66af0a88de91bd938a9840eaacd1724b73e1ecab1d1cae4b7642e6cd5404358

    SHA512

    45f0048a4e548444db8e5fb72fae2c319aaae1beda60afa0f143a544c0c91a60a26e63b2ab3e0b1912a3b83d5db8e216c4781ed494d5a6626a097b3b533a06ed

  • memory/708-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/708-9-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2332-10-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2332-11-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2332-16-0x00000000001F0000-0x0000000000231000-memory.dmp

    Filesize

    260KB

  • memory/2332-17-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB