Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 19:03

General

  • Target

    Unins.exe

  • Size

    149KB

  • MD5

    5286d1d76f3ee3d3c3bc324854133771

  • SHA1

    6d3ee9fb07feeaa3355a46ba096e8a86a8474cc4

  • SHA256

    c796c436fa42d694c536b9bf0fddebe1dbe1286895886e57c3873845254e1731

  • SHA512

    bd4796193d7343e5cb543de80170547eb88725a2435ec6b45b329b048b70ef65a9813b2ef129df3a30a7ab81c4ea269155d3965d44c93c3aab508e72436a9cd4

  • SSDEEP

    3072:6gQWiF+z4naYOLYvggLgdgeXYQVH0+ptiFA18ZKaRIQTXNDv+:6gQ+0naY3vggMdgeIudmVmQLNj+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Unins.exe
    "C:\Users\Admin\AppData\Local\Temp\Unins.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso8ECA.tmp\bindplugin.ini

    Filesize

    1KB

    MD5

    00c8dcce1fb167d952460bedcdf06daf

    SHA1

    11757dc50127bc62ecffb8eee381406ebda632a2

    SHA256

    6a13e76a804a1da93678218203c5c5ddf6b34e782e566a65c319c7bcdb7eb661

    SHA512

    91d26ed15aa71c54dcab2bf6798e17a794c226ab884c9f02e4795a24caf1d0008a065f62dbfff250edda190d6c90b6ced476ebcb3946e2b74082e30f52280bc1

  • C:\Users\Admin\AppData\Local\Temp\nso8ECA.tmp\bindplugin.ini_

    Filesize

    509B

    MD5

    411e377f8512b3607150cce9b4a6b503

    SHA1

    cb6380415181ac771e8d4b10471c90010fbc3783

    SHA256

    2691ba343ceeb72f8accf8d5d33c343ce8fa99bf6b9205fe0247d94c657a64c1

    SHA512

    429981bd28b833a7e5334595ce95e9f54245bb04a0a501139b23d980b215a1c3ff42ed5b450eb0be9f85b10c5794259ea1f241cb47114a733bf4b79c8159d33a

  • \Users\Admin\AppData\Local\Temp\nso8ECA.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    254f13dfd61c5b7d2119eb2550491e1d

    SHA1

    5083f6804ee3475f3698ab9e68611b0128e22fd6

    SHA256

    fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

    SHA512

    fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

  • \Users\Admin\AppData\Local\Temp\nso8ECA.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nso8ECA.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

  • \Users\Admin\AppData\Local\Temp\nso8ECA.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    ab73c0c2a23f913eabdc4cb24b75cbad

    SHA1

    6569d2863d54c88dcf57c843fc310f6d9571a41e

    SHA256

    3d0060c5c9400a487dbefe4ac132dd96b07d3a4ba3badab46a7410a667c93457

    SHA512

    99d287b5152944f64edc7ce8f3ebcd294699e54a5b42ac7a88e27dff8a68278a5429f4d299802ee7ddbe290f1e3b6a372a5f3bb4ecb1a3c32e384bca3ccdb2b8

  • memory/2120-0-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2120-77-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB