Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2025, 17:47

General

  • Target

    fefb5f1422efcba990f11b6ef02c2c1723cce765eada83aacc1887b9098df791.exe

  • Size

    29KB

  • MD5

    87d03acf39ab02bb4e5fc3a055878b3e

  • SHA1

    da6d892ef001e8e28fc8d97cee06ee5778b41679

  • SHA256

    fefb5f1422efcba990f11b6ef02c2c1723cce765eada83aacc1887b9098df791

  • SHA512

    d44d1b2ed2d501841c9cd6d343dfead2ef69dce392d126264195857a8c7a8dedd63da44c8cda7059a22e3e54d52efd130bc8d2e14f69397081bb41d2c3882fd6

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/qhR:AEwVs+0jNDY1qi/qCr

Malware Config

Signatures

  • Detects MyDoom family 6 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fefb5f1422efcba990f11b6ef02c2c1723cce765eada83aacc1887b9098df791.exe
    "C:\Users\Admin\AppData\Local\Temp\fefb5f1422efcba990f11b6ef02c2c1723cce765eada83aacc1887b9098df791.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp7744.tmp

    Filesize

    29KB

    MD5

    15049c805a1a75914ab5aaea22ef7344

    SHA1

    9b0ad9144c2a9e3fc0bee58d03a5cd3297189d20

    SHA256

    8d64e75f073cdd42a27d400aa0ecba646ceb13e2ae0104354cd1f4f61afa1c66

    SHA512

    a36da18efedaccb69d8b0b3681afc5d5b5e2d9937af100a3f8267e50335ef538ec5a0b0c055e0e9ac2b8f0ea5e94e97d4184f83d85c50f9d6c3faa487faf8622

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    c6c9ae3c10b1af71adbc4338a7975fda

    SHA1

    78aca711c2ef4d915ea3c3c503458458d1983346

    SHA256

    4904bdca3445b711e7a4c2c2888a9feb17ab426f2f64874c03041a73a9d7465c

    SHA512

    96b1425deb3268da33917385b551e974a0ffe521a70944211458bf75be2257e728814611feb49bbd7f62492c891b3c0421ba10265f527fc17129de886c2db976

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2736-61-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2736-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-17-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2736-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-77-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2736-70-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2736-9-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2736-65-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2736-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2736-37-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2944-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-62-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-66-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-73-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-78-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2944-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB