Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 18:05

General

  • Target

    ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84eN.exe

  • Size

    402KB

  • MD5

    216bb057c08279fd5e6f1d63ebcfc870

  • SHA1

    65b6ae32dde078ab2e3a97ee3a6215b18a707b51

  • SHA256

    ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84e

  • SHA512

    0fde16ee45267052f532cf543687a7d1cc7c2ccdaa41f7b5afcf9008129afb69559c03cb23105722e87ae25f3b2394706c9d6e1fde4836e0cea1d5fe386be17a

  • SSDEEP

    12288:4FiHUV3jIBLFlLHFP7rHkunuWPGX9CcEjm:4FiOjwFlzFP3TYQm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84eN.exe
    "C:\Users\Admin\AppData\Local\Temp\ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84eN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\DomaIQ.exe
      C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\DomaIQ.exe /path="C:\Users\Admin\AppData\Local\Temp\ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84eN.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\DomaIQ.exe

    Filesize

    211KB

    MD5

    27d5e5a09fa180c3238ed33bc7cf993b

    SHA1

    355f72845fcf414001808a8491e8dee3b8863cfb

    SHA256

    235602a88f5602010bc33f5b05671bfad3e2599d96273fc2c361357507ad08bc

    SHA512

    036a7620212f83663ae0c7498501fdba1609bf68488b735ac30fd986ed6c9017c132d562798e9bbcc911945601ea17d64e00020331ba2ef68cd5251ec40ad04b

  • C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\config.dll

    Filesize

    32B

    MD5

    99c24b9b5ff8e799f63a5cd83c45f22f

    SHA1

    27309942f049f86aa35abfe02e5aeb4b98092546

    SHA256

    121e0fe7dfcf0b30a94f69e5ce1fe6cacaae06eef5d8c0c1b4d1dbc053bacf74

    SHA512

    03700daca72551bb16253c731a7ece05128871baa45b36112b5d46c441e377cb2b26ed6e8f5d549abdf4cd3bb5d8d284ee65ea3ae25cefa1efb477f7a769f387

  • C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\routes.dll

    Filesize

    253B

    MD5

    0e89961cb0d97179cb73d72aae331b97

    SHA1

    337e2e5ce46ca83847dc7306ff39b7c38ae98997

    SHA256

    bdf9007a6d27ca4c9e28ea947c9eae58d53fd14a3a8d85615a7b471fbcd3ed51

    SHA512

    78f59688e38a771e2994feb449296a2a25abb2bb74c2ebf97d4c18ff252eeb01ada28c021aa8867bf746e1e5a56c51243508137e4bfb5d358b3fb61ba623e2bc

  • memory/2460-9-0x000007FEF5503000-0x000007FEF5504000-memory.dmp

    Filesize

    4KB

  • memory/2460-10-0x0000000000F80000-0x0000000000FBA000-memory.dmp

    Filesize

    232KB

  • memory/2460-11-0x000007FEF5500000-0x000007FEF5EEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2460-12-0x000007FEF5500000-0x000007FEF5EEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2460-13-0x000007FEF5500000-0x000007FEF5EEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2460-14-0x000007FEF5500000-0x000007FEF5EEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2460-15-0x000007FEF5500000-0x000007FEF5EEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2460-19-0x000007FEF5500000-0x000007FEF5EEC000-memory.dmp

    Filesize

    9.9MB