Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2025, 21:21

General

  • Target

    22dcbae08ee196439a1d4253ee3576d9974a3bce13b7b87fc4aa739c4bcfd654.exe

  • Size

    29KB

  • MD5

    90b643beac1fded1122f0fe20639e602

  • SHA1

    3c2bc8e2dade5394f97bd2b6d1e79766e66e4531

  • SHA256

    22dcbae08ee196439a1d4253ee3576d9974a3bce13b7b87fc4aa739c4bcfd654

  • SHA512

    cda0118b7e7565ae276d893b9841d69a3ef8f8b0288964e6497d2d32123ce58edd7f1d37e195ee124e5773b1f95c3cdd53a8c0494dc8711eee27e2bc42a7e383

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/yP:AEwVs+0jNDY1qi/qO

Malware Config

Signatures

  • Detects MyDoom family 9 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22dcbae08ee196439a1d4253ee3576d9974a3bce13b7b87fc4aa739c4bcfd654.exe
    "C:\Users\Admin\AppData\Local\Temp\22dcbae08ee196439a1d4253ee3576d9974a3bce13b7b87fc4aa739c4bcfd654.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35aaf183fbc003e1d894fa259098e6cd

    SHA1

    a6bbe7dc082c3cfb8c627e066e32b8226495edc8

    SHA256

    170dc6f01e77d34acd0c5f8280ae848362fd4ec2270093d4234d5829b9199615

    SHA512

    05a7844d47b3ffcb3ea10e1006078cab5a924d7eb378527e2d0fe50b6e1b4468d438646a4976009c703f85a22eeb1fcf86ec0d1bea9e4f8592e2aafc2746b634

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BCOPU31\search[1].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\Cab13BB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar14C7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmpADC.tmp

    Filesize

    29KB

    MD5

    6c67b6b94adedfe1575cf42abc5c3065

    SHA1

    48d8618b0e1fee5d211fadb1300d83d21a556bd1

    SHA256

    31475c5f2e27a0c805cd9f87bcaf84a7a5d04e1628ea306f85495a81ebbbd05f

    SHA512

    740237cb975769e88181a937303679f53ba3cb5b2d648147d6997af42832b90b35f1d364fc8038c9fcd3790ec4faf91244546ec9d61f41418b966cb7ae5ff3f4

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    6df4a7d4cf6bd6cf0b9ba1b957788ea4

    SHA1

    4bfeac445eb5bada1bd29e2dfd6c64f918547850

    SHA256

    f9b4d7d44225b5e464a894eecb36f0ea56533593e79df5f6c370110ed3e79351

    SHA512

    68a114fbbdc913fc8199289ae18cd8c255ad50e2ccdc7e9a2a2cb52db66786ac6a1ce720b8a91d9c04aca758e0a59fe96add21cd884ed8c8ad44f74b8b764df8

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    20b4c4f89caf6b3bd85d78c240487893

    SHA1

    8cd2734d16ad51212557eff4c2475006658b57f2

    SHA256

    d7e93c8515984df1b600b54a6b42c285906d876409063343459284b77951a9a3

    SHA512

    6841959035251c3f21c826b06de70a485b2f264e5ff9b99ab2d6a0605cf8fae2e9d0c32f773437841bcdadd4a28bd28a279d3c6d6066a6aa185c519644143f18

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2268-16-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2268-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2268-193-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2268-40-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2268-70-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2268-42-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2268-80-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2268-15-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2268-4-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2268-63-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2268-75-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2268-68-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2820-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-69-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-64-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-76-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-81-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-83-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-194-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2820-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB