Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 05:27

General

  • Target

    5321c33ae8cedff0602be71ad4dd5534c4a220386507a4f73c9c28a34b83c1b8N.exe

  • Size

    33KB

  • MD5

    910f7ec7d76823795ce34cc60e34fb30

  • SHA1

    eccfa37437bc8eb5a7f92fde068acdd8ebf1f76a

  • SHA256

    5321c33ae8cedff0602be71ad4dd5534c4a220386507a4f73c9c28a34b83c1b8

  • SHA512

    69b46c64384f732fdea2179f7fcae29bde549f77eab7feb0de374d7e99b1520c289993e26e070e05599fe0acaec24bf16b4d512f5b23b88d7a462be0c9c7cc0d

  • SSDEEP

    384:MIw07lRnDvTwFVmoDxRvYpXSCkChhE+1xudn5TiAt9BRgX3FGUDo1iXpE:Mp2FrwTmoTvjC0+ydn5GAX3+gUDogZE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5321c33ae8cedff0602be71ad4dd5534c4a220386507a4f73c9c28a34b83c1b8N.exe
    "C:\Users\Admin\AppData\Local\Temp\5321c33ae8cedff0602be71ad4dd5534c4a220386507a4f73c9c28a34b83c1b8N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\viewpdf_updater.exe
      "C:\Users\Admin\AppData\Local\Temp\viewpdf_updater.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\1103UKp[1].htm

    Filesize

    246B

    MD5

    0e7ef54c21a9cec1973643337acba393

    SHA1

    fb282cc3d39c1525b96feb53a658305178f3cc06

    SHA256

    12c0454bb10fd175f2a7fa7b3650883008c48bf2b1a7fe60dcf0109f0c505f8c

    SHA512

    a03b8f71783f178f41ad752b8c7904b5842483154a691a9e50327e85049ee113475f4b203aa2ea793de0c685f0ec64a0761db04a74aba4250e45b5d552019217

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\1103UKp[1].htm

    Filesize

    269B

    MD5

    63180a4464f3eec5c14f60e7e5be16f6

    SHA1

    c23a7baf3c8fae6ccc6916222a930be661e90806

    SHA256

    870aee10a54afcdb8ec5b50a2cb71c1aad26dc326273662c90bbb643c6985883

    SHA512

    7fe0f02a658b64c10e05b5f9e079f24a7c9b03a88c265e5644144e28ace0bdb70f6075f99b86f4af67f0400e1935367681f807c9b7a4dbbc92171925ce382f6c

  • \Users\Admin\AppData\Local\Temp\viewpdf_updater.exe

    Filesize

    33KB

    MD5

    f94b1676e88b656c80d4aed8dc4ce5d8

    SHA1

    93d1382cfe6d2b75ae759d47bc73b956e91d55d9

    SHA256

    8357fa2bd912394d49fd8fc99f6a59fc53b8b5130eb1f57a5f59e2600290bac9

    SHA512

    ea45b973e0292aa44804039a32680bf00661eb5db074096cb42b87837bb3007c0cd6dc5aa8003c18e4771320339de842c76c2276971a0ed9059e1094f77659b3

  • memory/2716-18-0x0000000000020000-0x000000000002C000-memory.dmp

    Filesize

    48KB

  • memory/2716-11-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2716-16-0x0000000000020000-0x000000000002C000-memory.dmp

    Filesize

    48KB

  • memory/2716-15-0x0000000000020000-0x000000000002C000-memory.dmp

    Filesize

    48KB

  • memory/2716-19-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2716-20-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2924-9-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2924-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2924-6-0x0000000000680000-0x000000000068C000-memory.dmp

    Filesize

    48KB

  • memory/2924-2-0x0000000000402000-0x0000000000404000-memory.dmp

    Filesize

    8KB