Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    80s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 21:24

General

  • Target

    c4e34d3dca7eed7cebf30699c5b323a0N.exe

  • Size

    197KB

  • MD5

    c4e34d3dca7eed7cebf30699c5b323a0

  • SHA1

    edd526e1e0cff6a4cd21fe9f7665b1af7129ac61

  • SHA256

    6cfecdfeaa0a713ce40bd8d841288d5b4058cd927f31b498629564fdc7a8bd05

  • SHA512

    4b242fa1e34523b1f5880d6c2e5640ff156b4b7e322512950bd60d70c5ca498011bd4f56d24fa8dd896f8e036a0c407bc8d9260bf175d3ffe7073eb68eb9b3fc

  • SSDEEP

    3072:PFoTtBnouRPq3rF7iipwrhVRII9lgNOjcftaW6ZuaPrTipn7VqH2EYyk9gw9:KlRChMhQyH0EvW7sHA52

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4e34d3dca7eed7cebf30699c5b323a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c4e34d3dca7eed7cebf30699c5b323a0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\c4e34d3dca7eed7cebf30699c5b323a0N.exe
      C:\Users\Admin\AppData\Local\Temp\c4e34d3dca7eed7cebf30699c5b323a0N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c4e34d3dca7eed7cebf30699c5b323a0N.exe

    Filesize

    197KB

    MD5

    02bc5aeb24448da19648827a4ea0ae71

    SHA1

    5aa945a5f7fe9fb4cb4e25fd51f005a4ba291682

    SHA256

    56c40e23f9ba3a90523503864913f78bba673ac1f527a70030c8e608f98baa23

    SHA512

    a509d385dcce94de473274724a9953125538077c9cb9424e77e475baa9707cc7f9efb25d827f77825f7288e40617a06363ed98ac7b9724bd8d17f66fe31fe246

  • memory/1688-12-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1688-13-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/1688-18-0x00000000003C0000-0x00000000003F9000-memory.dmp

    Filesize

    228KB

  • memory/1688-19-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1948-0-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1948-11-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1948-9-0x00000000001C0000-0x00000000001F9000-memory.dmp

    Filesize

    228KB