Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2024, 02:42 UTC

General

  • Target

    5a99c490bd9b35a1efe9c4233023dc37641f78b67e34632c9833ec8c06c3c4af.exe

  • Size

    545KB

  • MD5

    6fa8bc297f2359d3cd35fc1ef12c1b9e

  • SHA1

    b6be96971f04dd616e399a2cad14d49e08623036

  • SHA256

    5a99c490bd9b35a1efe9c4233023dc37641f78b67e34632c9833ec8c06c3c4af

  • SHA512

    baec2716fc69dc58a2eea22458ef6ab10825beb537bbdb9ec727d6086ea0cdff06136f709173c01a6643ef6bfc717e04e6de285862a5a6d5e9e3d9c9a6529793

  • SSDEEP

    6144:VPXc3AQYxRhND7QZ+Z4jeRZEkzu5PdT0qsTbKqN1Z+i1Sl9DsZ+cBcomv6rb2:iuRT7QZ+Zj4kq25Cl9DsZ+URr

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a99c490bd9b35a1efe9c4233023dc37641f78b67e34632c9833ec8c06c3c4af.exe
    "C:\Users\Admin\AppData\Local\Temp\5a99c490bd9b35a1efe9c4233023dc37641f78b67e34632c9833ec8c06c3c4af.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -w hidden "$Realindkomster=Get-Content -raw 'C:\Users\Admin\AppData\Roaming\trossamfund\Enwreathing253\fejningen\Catchpoleship.Ter';$Pamfiliussernes173=$Realindkomster.SubString(57686,3);.$Pamfiliussernes173($Realindkomster)
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2308-8-0x0000000073C01000-0x0000000073C02000-memory.dmp

    Filesize

    4KB

  • memory/2308-9-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2308-10-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2308-11-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2308-12-0x0000000073C00000-0x00000000741AB000-memory.dmp

    Filesize

    5.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.