Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 11:36

General

  • Target

    ab0a7987950879076732463e85bbf4c440930ad046578695cc0934bf564ea40e.exe

  • Size

    29KB

  • MD5

    3c6caa90fa3f58e6df122093f4c6efa3

  • SHA1

    a7255e25c5f8b38bcf138232144a647afff1e255

  • SHA256

    ab0a7987950879076732463e85bbf4c440930ad046578695cc0934bf564ea40e

  • SHA512

    ea02c65560976ea3b41acd9b1e3b8c7191f99ca52a18961b9a1e279139620b1f244667542a2647d45a6c7f4eacf5cf76e9792ca17989b97809f1202ffcf77bf3

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/hhg:AEwVs+0jNDY1qi/qpi

Malware Config

Signatures

  • Detects MyDoom family 8 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab0a7987950879076732463e85bbf4c440930ad046578695cc0934bf564ea40e.exe
    "C:\Users\Admin\AppData\Local\Temp\ab0a7987950879076732463e85bbf4c440930ad046578695cc0934bf564ea40e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ae6339fed36a7993039ade48a445b02

    SHA1

    a218b3c7b07fe4f6e80f4959b0d4d4eded1cf025

    SHA256

    78febbe6037bdbf7a1e1abbe44400c2f10d94a91efcbf87cfdcebe686b0e42e0

    SHA512

    c501de3ad33a6e48f988e29eccff337f20e3597ca9c3f5676638c18232457b08ff3f48227a900c5ad60afd0c880155f3170e9e61034763432b2752b60d25a00f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a81ebb5007542b53d0ac267f365b4c79

    SHA1

    7da4a6781717657d701b8985860c806f6e40b97b

    SHA256

    e83e188105c766602ab2be779c08fa21eaaad729d7934294fcbfb0f29c430457

    SHA512

    9bf7f882f0ed3ad70803d2bb3d467491398d3720937701f0692c56021427d00aac66cf3e587a65ef4d0f713c93b10bbefd384b2f57da75e665d853b2c096230b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17fa17123f21e27dfbea5564729e1def

    SHA1

    e37cb1131c7356d4788e74f556af947d3ac57597

    SHA256

    47b0923343b70e07cdb274c977695bb17119a72ca66789b9cf0b6a3b13e427fd

    SHA512

    2f01afd803c464d47ef5368a1ade2cab5c6545e60e93bb81e78a6e6058b3abbf4451142bed7aca19811f0f1d7d2bbd9d439d58ebfe55f179fe225113178b5146

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\39GEHZPO\search[2].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\Cab78E1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar79A0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp712C.tmp

    Filesize

    29KB

    MD5

    c63160113f9cba052c29b63d87524a84

    SHA1

    28f2a0537789709ba8199be6cb844aaf84b97021

    SHA256

    8f255f7058d75ac329dc6dab27d128babb10b4354477e610b47e5363f4ed43a3

    SHA512

    f979614cf8b5957d6d119085e4d98b1923e0494dded07617cc713f1924a3a1bb856fad91cc2bfaf0f69a8448d48fc25eb85b201e0b93a719d0c056d31c61f5af

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    0dd0028e70987bce48d4026b48f8af94

    SHA1

    aac46b6c75585bbd7c8f7231c732288c52c76bd2

    SHA256

    4438bbb8e12c8828549dda602cf5fda73556ca56e7a1b14598866aa5aefbfabb

    SHA512

    8e70612f64658e3125d68ae4fa56d2195a4e3010e0d31bcfbfdcce94f0fb9f361054040289b1ecf5beec332378e923d59f8d94789c10ec995e8a799bc89763e2

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    58db9b929423621fbd29ea25da9039f6

    SHA1

    e02e702acb28cb0a9c64b5cd964347c3524a0bb7

    SHA256

    6565de617b89787cfbb12ca90c953ef24140ea689aa7ee1d5d088302f4ff577c

    SHA512

    7771064e2e05e19d3f8a33fbd7e29533ac7f5e64126418965bd25ba70fe5948219457943d8fd9d20d571c041bb1a019143fe131508f2ec2478bf372372fa28ec

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1680-9-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1680-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1680-33-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1680-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1680-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1680-47-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1680-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1680-71-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1680-59-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1680-17-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1680-61-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1680-73-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1680-66-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2496-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-67-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-62-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-79-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-60-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-48-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-34-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-27-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-22-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2496-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB