Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 21:46

General

  • Target

    e7f84a0cb8ac51a55c6c4df00a948650N.exe

  • Size

    44KB

  • MD5

    e7f84a0cb8ac51a55c6c4df00a948650

  • SHA1

    ea2dd4482c2b813130985bedc2ca2f31712b39ff

  • SHA256

    9997dbed062d6dac78062c02d750683890809ce92b155da23ee11f7e502dfae5

  • SHA512

    ece1adf7d2d0236192754a75bc94e71ce5962e0f12071eb522fc3bce3f198fb1ec0dc94d95f366e739e9e4fe860480203172c487e636df8be8a81d0c45884e5b

  • SSDEEP

    768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAqjr4:bCDOw9aMDooc+vAqjU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7f84a0cb8ac51a55c6c4df00a948650N.exe
    "C:\Users\Admin\AppData\Local\Temp\e7f84a0cb8ac51a55c6c4df00a948650N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Users\Admin\AppData\Local\Temp\lossy.exe
      "C:\Users\Admin\AppData\Local\Temp\lossy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\lossy.exe

    Filesize

    44KB

    MD5

    9c49cc8bafff1db36c2449c64c01c0f4

    SHA1

    97c446b4d278ac15ac98f5a3c95fa5c8ed0c7e0f

    SHA256

    1b997baf60231b0bf2ac975b4aba6c1981c333004a7727d93e614cedddb676f2

    SHA512

    574888cafadf9b7f49f9f82614b1489a04cbaeedbdefe0dda4c8ce4e03d3fe71533352dc057c7d43bcca7f157f3b7a8625e5d439e2a033b98247a6a2c38433c1

  • memory/2160-0-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2160-2-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/2160-9-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2160-1-0x0000000000320000-0x0000000000326000-memory.dmp

    Filesize

    24KB

  • memory/2160-14-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2776-16-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB

  • memory/2776-25-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2776-18-0x0000000000280000-0x0000000000286000-memory.dmp

    Filesize

    24KB

  • memory/2776-26-0x0000000008000000-0x000000000800A000-memory.dmp

    Filesize

    40KB