Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    116s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 16:15

General

  • Target

    903a7afc7226ef8b5d19808403508580N.exe

  • Size

    355KB

  • MD5

    903a7afc7226ef8b5d19808403508580

  • SHA1

    cc4dd3cd73093c460bfc6c27199fb249620024e4

  • SHA256

    4b4616813d6608450f07c8ced20e1d8cad4f53242aaadcfa6dfd6e131ee335ce

  • SHA512

    59cfca1da1508e4244942edac2a7638285d8c0a43b104e174387282e797e9abcdda7adcccef06c6d6c0c8fa39ea7b415e265a51d88d5bde8204ea9029a2db6fb

  • SSDEEP

    6144:R3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:WmWhND9yJz+b1FcMLmp2ATTSsdS

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\903a7afc7226ef8b5d19808403508580N.exe
    "C:\Users\Admin\AppData\Local\Temp\903a7afc7226ef8b5d19808403508580N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\69P6875H\login[5].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\47B8.tmp

    Filesize

    102KB

    MD5

    59eb712ccf3ee8e654b118891c5ac566

    SHA1

    f10669ed7910a29008d0da774da25ef47b891530

    SHA256

    f575efdc9614be0cd1c7056bd2d7fe1525428ab624d528ca583649b03136d403

    SHA512

    b59c9d8b4bdea213cd8f4c7bc6b9559050b9f6f8951e9fc115999e7c3d3db29bcc3e4576264d6b9176308c28da5be62ef76ad9885fe938a34994e36acc5dc781

  • C:\Users\Admin\AppData\Local\Temp\4857.tmp

    Filesize

    24KB

    MD5

    6936c68128fc3ba1637c2937b3c98319

    SHA1

    620d88d997fc75c7b3cdeebcc321daa23aed67a9

    SHA256

    cffdfef87c8927192113b293922a535f8c471e0d818ea254af56153bdb4524bb

    SHA512

    a789780353931cc1b513d3dc5a352696ee41fea7233b939f136599ee7c35eb2695cc8c230a41d04190cad96c1796dbd2b99957ee978cd15b3da96e273b3a4d9c

  • C:\Users\Admin\AppData\Local\Temp\DF9F.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • \Windows\AppPatch\svchost.exe

    Filesize

    355KB

    MD5

    7c9898b61b84cb3310a06970b4429781

    SHA1

    5996fc0845513970f56ca4c773751109602c4932

    SHA256

    a25c96cb83a4f1b77b7b09c1143108148199ad03d919c04212a71072c453568f

    SHA512

    4b5672eaebf94dbb5ddd2490645e74c833cc3d586dac3af9631c299bcd5e18832e106cb72abb27ba8a71b5bbf69f1377bf382d798bce0e7fdcfc230ab2d0ffea

  • memory/1820-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2496-14-0x00000000004D0000-0x0000000000578000-memory.dmp

    Filesize

    672KB

  • memory/2496-18-0x00000000004D0000-0x0000000000578000-memory.dmp

    Filesize

    672KB

  • memory/2496-24-0x00000000004D0000-0x0000000000578000-memory.dmp

    Filesize

    672KB

  • memory/2496-22-0x00000000004D0000-0x0000000000578000-memory.dmp

    Filesize

    672KB

  • memory/2496-20-0x00000000004D0000-0x0000000000578000-memory.dmp

    Filesize

    672KB

  • memory/2496-16-0x00000000004D0000-0x0000000000578000-memory.dmp

    Filesize

    672KB

  • memory/2496-27-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-30-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-28-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-36-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-46-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-78-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-77-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-76-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-75-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-73-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-72-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-71-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-70-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-69-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-68-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-67-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-66-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-65-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-64-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-63-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-62-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-61-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-60-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-58-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-57-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-56-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-55-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-54-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-53-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-52-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-51-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-50-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-49-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-48-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-47-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-45-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-74-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-44-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-43-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-42-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-41-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-59-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-40-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-39-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-38-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-37-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-32-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-35-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-34-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-33-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB

  • memory/2496-324-0x00000000022E0000-0x0000000002396000-memory.dmp

    Filesize

    728KB