Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    77s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2025, 06:45

General

  • Target

    563c1b34ec79c80bedd9eb8f86a84e1063b73fe558448e2a0dba97695018b48bN.exe

  • Size

    577KB

  • MD5

    364ed7bf0924cdcc8d576f6c4b443730

  • SHA1

    0ef3bcb771367141d75ce35e32056f3a18734ea4

  • SHA256

    563c1b34ec79c80bedd9eb8f86a84e1063b73fe558448e2a0dba97695018b48b

  • SHA512

    6e2b868a11aa5b1acd7c43b6f30189b74013760fcfdcc0801330df5e7dcadff7d607e465f09c2671dacdc0b5d1aef3083ceda7a27a7c59fb83b156e6519c4238

  • SSDEEP

    12288:YbD5arFJwK6hMJ6ZzHFZfc28beMGTfZuqb7L:rBJwdhMJ6ZzHrfcsMGTfZ5PL

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\563c1b34ec79c80bedd9eb8f86a84e1063b73fe558448e2a0dba97695018b48bN.exe
    "C:\Users\Admin\AppData\Local\Temp\563c1b34ec79c80bedd9eb8f86a84e1063b73fe558448e2a0dba97695018b48bN.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe
      "C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe

    Filesize

    577KB

    MD5

    c084b422b7db88c51d5fb98eef81c0cf

    SHA1

    c6fa5bee9472a897009ba1abbf40e10e6b718244

    SHA256

    54f45d596387743df73ee842bd689fa27ff0cc959b29d06cf0f508392491de1b

    SHA512

    47c0da8ac735b3d3f0cce546a4d4d47f5146d8531e42df8f7205c766a24adb8e68ed0d3e177e885c832db89d3f5ddc99b4280dfe7462be3755589dcd1ae25936

  • memory/2568-3-0x00000000747E0000-0x0000000074ECE000-memory.dmp

    Filesize

    6.9MB

  • memory/2568-2-0x0000000000380000-0x000000000038A000-memory.dmp

    Filesize

    40KB

  • memory/2568-0-0x00000000747EE000-0x00000000747EF000-memory.dmp

    Filesize

    4KB

  • memory/2568-4-0x00000000747EE000-0x00000000747EF000-memory.dmp

    Filesize

    4KB

  • memory/2568-5-0x00000000747E0000-0x0000000074ECE000-memory.dmp

    Filesize

    6.9MB

  • memory/2568-1-0x0000000001360000-0x00000000013F4000-memory.dmp

    Filesize

    592KB

  • memory/2568-14-0x00000000747E0000-0x0000000074ECE000-memory.dmp

    Filesize

    6.9MB

  • memory/2888-16-0x00000000747E0000-0x0000000074ECE000-memory.dmp

    Filesize

    6.9MB

  • memory/2888-15-0x0000000001300000-0x0000000001394000-memory.dmp

    Filesize

    592KB

  • memory/2888-17-0x00000000747E0000-0x0000000074ECE000-memory.dmp

    Filesize

    6.9MB

  • memory/2888-18-0x00000000747E0000-0x0000000074ECE000-memory.dmp

    Filesize

    6.9MB

  • memory/2888-19-0x00000000747E0000-0x0000000074ECE000-memory.dmp

    Filesize

    6.9MB