Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    359s
  • max time network
    361s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/11/2024, 17:36

General

  • Target

    WinPcap_4_1_3.exe

  • Size

    893KB

  • MD5

    a11a2f0cfe6d0b4c50945989db6360cd

  • SHA1

    e2516fcd1573e70334c8f50bee5241cdfdf48a00

  • SHA256

    fc4623b113a1f603c0d9ad5f83130bd6de1c62b973be9892305132389c8588de

  • SHA512

    2652d84eb91ca7957b4fb3ff77313e5dae978960492669242df4f246296f1bedaa48c0d33ffb286b2859a1b86ef5460060b551edca597b4ec60ee08676877c70

  • SSDEEP

    24576:UBOldyR6ORWsaM2QROxa6jsqUENfJjNK/CG6niqiL:2KzqWsayROxa6QDENuaG+ifL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WinPcap_4_1_3.exe
    "C:\Users\Admin\AppData\Local\Temp\WinPcap_4_1_3.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso5B4B.tmp\bootOptions.ini

    Filesize

    349B

    MD5

    73461ff69941beefb0f5630b29b5ae2e

    SHA1

    f8f33b309db03f1bc5a9fd452150245474c000f1

    SHA256

    81a27757de2fa404014be9a73f502537628f82a3da3f809b1ff5584a828910b8

    SHA512

    38b3a21683bb30cc301406e2f12d0cf916299a4618af552f9e01b1b0fecddf22c79e37f7aaf3f2a85706a263049d10c17ccc417fa9c07f8b74c28284a02da460

  • C:\Users\Admin\AppData\Local\Temp\nso5B4B.tmp\ioSpecial.ini

    Filesize

    578B

    MD5

    55eaf2145e91a3a2382a207d48e5bfb4

    SHA1

    d0c92e84db4cbd90e5fc35640304f2fb76b43ac4

    SHA256

    db68af7c24ced6479d6c6f7be81568179fbca63c2b7c419b74eaf4994052509d

    SHA512

    72c9820f390637da9ba1f5023e63c4ba1bf6815a33948f5583dcc728bea1289336776762724447f64f9cbf4461f06183fee6ba9a8b05972627a503841f3b65ef

  • C:\Users\Admin\AppData\Local\Temp\nso5B4B.tmp\ioSpecial.ini

    Filesize

    617B

    MD5

    f48f4610fe7741ca5f759e276215372e

    SHA1

    8352813bcc3672d485a726f141d830d18d852871

    SHA256

    2b6ca3cf74f13beacd571d4c0e33cb4b3702e7e3a4fa79bfb81a4f75ab4916d7

    SHA512

    b6e36433e6492ca6ccd9fd68b79c52e401b430750155c33de9cfd520685e11085fc421d67d9765666245e3730a22f949d5c89ced1e70860b187bc00207b3cc02

  • \Users\Admin\AppData\Local\Temp\nso5B4B.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nso5B4B.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b