Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 01:54

General

  • Target

    c3d15a76336bdb3d60139b78bab2ef22b0134583c2fcb9d64b514ad770704eeb.exe

  • Size

    26KB

  • MD5

    69f6036eeee211095f3b91e90d2ec8fb

  • SHA1

    b856bcf7b4c4dc5822192c581526b44dda9efa05

  • SHA256

    c3d15a76336bdb3d60139b78bab2ef22b0134583c2fcb9d64b514ad770704eeb

  • SHA512

    9a9a5fbb67091b0cfcbcb2453e554a91bf365cd4f851afd2faad30af7f92b9cfa267c111718d86e7702ead33bf2d774d0fc7071abb488e3eabcc65f2fbed2f36

  • SSDEEP

    384:F3EqGY2HXgrS40Lol5ZLzH4VhvshYpATUgch1A9NB/erxUk8t2GY:F3EqG5H8PuoljH4vEhkgs1lxoY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3d15a76336bdb3d60139b78bab2ef22b0134583c2fcb9d64b514ad770704eeb.exe
    "C:\Users\Admin\AppData\Local\Temp\c3d15a76336bdb3d60139b78bab2ef22b0134583c2fcb9d64b514ad770704eeb.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\winupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\winupdate.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\winupdate.exe

    Filesize

    26KB

    MD5

    d91a9d88099cd741778f82354cdb0fe9

    SHA1

    eca86c2b051e766c7a3f20516cde77688ca00e4a

    SHA256

    437b16977ba2b28177a51c2125996f21dcd44cd7abeab3bb135d80eb2f9f3ab1

    SHA512

    777f3178b2e79fbb74302494fe18a92fbfa781dc1f16243581a4b71f28091de017172b2ad566a3b4a34eb362fea13bcd69a87f2cb25a9afcdfa8eb43705445b3

  • memory/2180-0-0x0000000000500000-0x0000000000511000-memory.dmp

    Filesize

    68KB

  • memory/2180-2-0x0000000000501000-0x0000000000502000-memory.dmp

    Filesize

    4KB

  • memory/2180-6-0x0000000001E00000-0x0000000001E11000-memory.dmp

    Filesize

    68KB

  • memory/2180-10-0x0000000000500000-0x0000000000511000-memory.dmp

    Filesize

    68KB

  • memory/2180-30-0x0000000001E00000-0x0000000001E11000-memory.dmp

    Filesize

    68KB

  • memory/2812-11-0x0000000000500000-0x0000000000511000-memory.dmp

    Filesize

    68KB

  • memory/2812-12-0x0000000000500000-0x0000000000511000-memory.dmp

    Filesize

    68KB

  • memory/2812-31-0x0000000000500000-0x0000000000511000-memory.dmp

    Filesize

    68KB