Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

28/09/2024, 14:36

240928-ryyffs1app 7

28/09/2024, 14:32

240928-rwa75stbkg 7

Analysis

  • max time kernel
    9s
  • max time network
    19s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 14:32

General

  • Target

    RegeditCheck.exe

  • Size

    6.4MB

  • MD5

    4529f711884c8e84adb821542f5076dc

  • SHA1

    62bd1c4f35eb9edba00036093cdf41b28d0a14ef

  • SHA256

    eba0858da0cb603cb22fc4a78472290fd5550d7cb98d29c9725179858f82b401

  • SHA512

    315ab2911c9f5517edf29acfaffdb80e0eaaae91fd0eb66236ad18ec27eefa072c492702a2d24b36a397f51c3400d0bbb4dfffc638c7ef2dc6fe87d0203645f1

  • SSDEEP

    98304:pm8FIfo3y7MD/x/0feyGutbQ940BDlgwdnpka9R/k9t+2+SpXqLGt+ZKkqLcGLKB:pmYP35DfyGuwBdnpkYRMoSENZKk2Lg

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RegeditCheck.exe
    "C:\Users\Admin\AppData\Local\Temp\RegeditCheck.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4136
    • C:\Users\Admin\AppData\Local\Temp\RegeditCheck.exe
      "C:\Users\Admin\AppData\Local\Temp\RegeditCheck.exe"
      2⤵
      • Loads dropped DLL
      PID:4628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI41362\VCRUNTIME140.dll

    Filesize

    95KB

    MD5

    f34eb034aa4a9735218686590cba2e8b

    SHA1

    2bc20acdcb201676b77a66fa7ec6b53fa2644713

    SHA256

    9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

    SHA512

    d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

  • C:\Users\Admin\AppData\Local\Temp\_MEI41362\base_library.zip

    Filesize

    1.0MB

    MD5

    f1aa8a7f41b5fcfac3d47b2ce48c9cb1

    SHA1

    0efb0bf9d8c6c7fb4f9020f6e0af3544a72c66fb

    SHA256

    55a93c1e77170cdde4eedf6ba65378cdc3ddc690ca639819cca83e00bf225b1a

    SHA512

    c8f7f5ec5f49277daba5de0ff835cfa59ccd8594318bdd8f6912f1c9d2c4cbbf0fb70542111e24cf12923c75dd71362df42ae16b0e49c0312104c87afd4bf34d

  • C:\Users\Admin\AppData\Local\Temp\_MEI41362\python310.dll

    Filesize

    4.3MB

    MD5

    63a1fa9259a35eaeac04174cecb90048

    SHA1

    0dc0c91bcd6f69b80dcdd7e4020365dd7853885a

    SHA256

    14b06796f288bc6599e458fb23a944ab0c843e9868058f02a91d4606533505ed

    SHA512

    896caa053f48b1e4102e0f41a7d13d932a746eea69a894ae564ef5a84ef50890514deca6496e915aae40a500955220dbc1b1016fe0b8bcdde0ad81b2917dea8b

  • C:\Users\Admin\AppData\Local\Temp\_MEI41362\ucrtbase.dll

    Filesize

    992KB

    MD5

    0e0bac3d1dcc1833eae4e3e4cf83c4ef

    SHA1

    4189f4459c54e69c6d3155a82524bda7549a75a6

    SHA256

    8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

    SHA512

    a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd