Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    83s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 13:45

General

  • Target

    abd53df94be520c9ffc051622f3d594a5d08546194b8ddcc10743a1bcd3b59a2N.exe

  • Size

    56KB

  • MD5

    3458f0dcfb6dbcbd559f794644027bc0

  • SHA1

    665aa20dfca8fdd96e6fc1c2291e2b23280eb5a3

  • SHA256

    abd53df94be520c9ffc051622f3d594a5d08546194b8ddcc10743a1bcd3b59a2

  • SHA512

    9ac9079d8a4bb5b8990c12726c3590c51d0efe8f475a3b2888d80dac9c0295d4af930d60cced32bd7a8b30fd87e972dcae9fd0603a4fea43fa22439c4060f53e

  • SSDEEP

    1536:oO5v1gbkndwQESYFocKIBN4UfqP1JLh0PebISH:odgnNRufzSPT+mcSH

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abd53df94be520c9ffc051622f3d594a5d08546194b8ddcc10743a1bcd3b59a2N.exe
    "C:\Users\Admin\AppData\Local\Temp\abd53df94be520c9ffc051622f3d594a5d08546194b8ddcc10743a1bcd3b59a2N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Users\Admin\AppData\Local\Temp\abd53df94be520c9ffc051622f3d594a5d08546194b8ddcc10743a1bcd3b59a2N.exe
      C:\Users\Admin\AppData\Local\Temp\abd53df94be520c9ffc051622f3d594a5d08546194b8ddcc10743a1bcd3b59a2N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\abd53df94be520c9ffc051622f3d594a5d08546194b8ddcc10743a1bcd3b59a2N.exe

    Filesize

    56KB

    MD5

    47bf8a1e27b9a5d2029f4731c588b318

    SHA1

    69f1e3c0d64276621a35ab3602571454100dc428

    SHA256

    433ac15659a7c4ff222635901f4493a16324bb789a1d000581fe553aa89ffc3a

    SHA512

    877cdeee925b477366d71d07fd83589b93e46d19e5758765da96561494b6b3f97cc15e909751ade32674d46461572648cefcc86eed06a9ea1cd0c5849ee7caab

  • memory/2664-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2664-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2664-14-0x0000000000030000-0x000000000003E000-memory.dmp

    Filesize

    56KB

  • memory/2664-13-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2984-16-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2984-22-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2984-27-0x0000000000030000-0x000000000003E000-memory.dmp

    Filesize

    56KB

  • memory/2984-17-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2984-28-0x00000000002F0000-0x000000000030B000-memory.dmp

    Filesize

    108KB

  • memory/2984-29-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB