Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2025, 10:38

General

  • Target

    f7e6fd7ed06d216fe71ed134ac26a7fb0f7233e3199ade0b71046dc94736aced.exe

  • Size

    29KB

  • MD5

    6e0c85e20296d4906ceaba8dff5422ed

  • SHA1

    3830bb4726b273aa653b4bc12eb53446bbe16e66

  • SHA256

    f7e6fd7ed06d216fe71ed134ac26a7fb0f7233e3199ade0b71046dc94736aced

  • SHA512

    44d225bdbddfc9ee377c6f9574404664d3f83d79aa8d41a1a796216d61b2bbf53b8838f0d57bbde6b84bc3c57a880e9a7db08161a49e4c7ad1a3caed4ee8fe04

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/RnhV:AEwVs+0jNDY1qi/qpnj

Malware Config

Signatures

  • Detects MyDoom family 8 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7e6fd7ed06d216fe71ed134ac26a7fb0f7233e3199ade0b71046dc94736aced.exe
    "C:\Users\Admin\AppData\Local\Temp\f7e6fd7ed06d216fe71ed134ac26a7fb0f7233e3199ade0b71046dc94736aced.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4dc82b9e0ce19410cc296afbaa50726

    SHA1

    e2f016d5a835703ac7e273dc767be156306f95f4

    SHA256

    c1ce78fb4b80038d6661da0e4f8a5cb72c9d7eaf199341afadccc7d20bc3243d

    SHA512

    fae89c25cfdc4f075286790903f76246d1746b4c6a46a39be80a8da6dd416d4f8f5f45316ff4afd3888f7b147187d4e0ae7ca564287bf13d0f897045715f2b4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e45f1ad08d2db4664b4287446240b5e

    SHA1

    16bdd69740d32795a5ecd70506203973e314728a

    SHA256

    1c7258f8c8876acd68e94e25ed235c9f24e5d059a9ce264eceb990ee41e32061

    SHA512

    1b4f6af6f13e7d37d661fe48621cddf5652384207eb56309d0fcb56be9d7605ee24ae11a2e171f978a0f6440374d689f63f2381abff179566011a5e459dc3ecb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b4b5ab84192599687987092a4bdb78c

    SHA1

    40e9732a9379693e24e1c3d28818da85e88dc5b6

    SHA256

    eff59b614b2cb99f67f4142d64f9e55b2d799178265f347d553b301aed331762

    SHA512

    b317a8def6ec1ec19e49289bd07ef554c3d50ee5f192b4a2eb9713bc74d083e4d12c1159aa5e27b9e4e63b26d66abda411681a1d3ee8309244db7cbeee17b770

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2c844dc4a90137b6a5bbddc84d71d28

    SHA1

    6328f29b89f92880d12ab7ed0e4f74b5fe6ef77f

    SHA256

    4a6bba0477d76bf6fc85cf2ee1ad1fb7e4be61fa8483e24c8b90d3f720eb5304

    SHA512

    1244bbae1b253f123db189b12f4dac25cd7024ddb0fd8c47b5563615c7ee1b2123b3925c7e37f8810ff4ecb2df5f95959fb876d79ac725564f1fc6d8f31efa1a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\search[3].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\CabE548.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE5F7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmpDD26.tmp

    Filesize

    29KB

    MD5

    e6435eb0c99bbeccbe5c7c3d9360d644

    SHA1

    b934f0eb9b5d43e8e7d414a2462cc90588d98878

    SHA256

    fc1048fe1bce39f46cc695c0b29fa5b6c787988a1ec43ffbf3144e6efb64cc65

    SHA512

    78cac773e4a3705acaa44c00e35fe983c9c6e20074ff75544737b9731f9c1eaea0612db1fe938e60dc85e5d00c738c9f7ca2ff0398a2190a7c17791da2bce4ac

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    06d1929dc427c392f7b42465f2442cda

    SHA1

    9ca3054158d5c2bdd209519e8e7218f904407395

    SHA256

    915ece602f93bae6a8b4658c5bcb06a1b50adaaaff21d93774f368b7f8b00bff

    SHA512

    253549cbc8bc5e5e8fab53f1b7b93d120dd0d7911697c9d9872f57540a5ac4ecf75c8b2739a445da45437cd0297bbd50a0709149c89a7377b0062167e70fd1f1

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    ff75669308a380aa52e265acaabff0d6

    SHA1

    60707482b5d3f45e69214ae07bb3607103fffa3e

    SHA256

    ef4fab09a71ac3eecea1f367c0d7b0d6adb821559d8dcb5b6a46a1a305619c61

    SHA512

    a91615153512bfebe8b2a9dd3086f910b893e2566bbd2ee0043be8fb0e281104eabb5682357106dfa555728df5c5ae4a20d1135eb20a04f3a89f02f701162d23

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1100-62-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-78-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-66-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-68-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-73-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-85-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1100-80-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1712-79-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1712-84-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1712-42-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1712-77-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1712-67-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1712-65-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1712-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1712-61-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1712-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1712-9-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1712-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB