Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    15/12/2024, 22:57 UTC

General

  • Target

    88187f01fc8d0c2ad4a1e73bcb9b66af307ccae44b247fa9c8107f94e4de10ed.exe

  • Size

    325KB

  • MD5

    db967290bb6b8acef00c83852d57b377

  • SHA1

    2d0586e2a15a1d87513264b49f6c8719fe70d28b

  • SHA256

    88187f01fc8d0c2ad4a1e73bcb9b66af307ccae44b247fa9c8107f94e4de10ed

  • SHA512

    8ac3cb7676ea1500fb239f38bc3d09d9c6131a692d53a5d3baf86c1e0ca31c27aa8e245b6a7402ccfac6b62531083bf2ee1521528eb69c9ea61e2682f59779e2

  • SSDEEP

    3072:n1qczo9jau6ddOBLuieE5QeH/ln9J4HKJAyopebLwREpgQ/N77aWt/WJs+fL8L6e:13JCB/tnJABeb7gwt/ifL8L6Z7g

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\88187f01fc8d0c2ad4a1e73bcb9b66af307ccae44b247fa9c8107f94e4de10ed.exe
    "C:\Users\Admin\AppData\Local\Temp\88187f01fc8d0c2ad4a1e73bcb9b66af307ccae44b247fa9c8107f94e4de10ed.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2772-0-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2772-2-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2772-3-0x0000000001D50000-0x0000000002E0A000-memory.dmp

    Filesize

    16.7MB

  • memory/2772-4-0x0000000001D50000-0x0000000002E0A000-memory.dmp

    Filesize

    16.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.