Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2025, 20:05

General

  • Target

    2f440d0cf35234a942bb2c983815f3d47a2e105aa28bf6a7ea6baed3e627d608N.exe

  • Size

    29KB

  • MD5

    acbaddd338055e5f5cf9865a46a8a2f0

  • SHA1

    7fc97419067793a431a42106bb31441e02f3db5c

  • SHA256

    2f440d0cf35234a942bb2c983815f3d47a2e105aa28bf6a7ea6baed3e627d608

  • SHA512

    4c4fd260347b6c849de8ab7d18431599919b3739c925b6d47698e3300ba54a243c8009f318f0b993a571659da8dd8cc869ce4303c2e7fa2b045aa483d4549df9

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/lh3:AEwVs+0jNDY1qi/q9V

Malware Config

Signatures

  • Detects MyDoom family 7 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Mydoom family
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f440d0cf35234a942bb2c983815f3d47a2e105aa28bf6a7ea6baed3e627d608N.exe
    "C:\Users\Admin\AppData\Local\Temp\2f440d0cf35234a942bb2c983815f3d47a2e105aa28bf6a7ea6baed3e627d608N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpE7EF.tmp

    Filesize

    29KB

    MD5

    4c0fe5e831b7dadece130c4084ddd8a0

    SHA1

    2577bec55913ab8d016c021a1faee2f4857f6cf3

    SHA256

    9d24347a7340875d30e727fd4ca16be9d2633e2ce37e2a92f0c8ae48ec90e59d

    SHA512

    b0373793bf28e82d4013ab2b47b3cca72fb328bed98eeecb04040cf91784ebc089ccbe71d7cd92bcf1d144ebdd7a2a7451e1af06e3bdc36d72854a1096f5c159

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    cab64fd853b7d867f09844af2a856aa7

    SHA1

    6935c6d8128e91187003832bd8ff35d7831c53e0

    SHA256

    176599ae3b4ca0ab47104e7668b5038b6563a34528eeef6ca2634a2f855ebcd8

    SHA512

    cd67cdb4845adcd1951fb9f0f23f152bff3a0037a42b277ae9c252f7b19d1c3f76ef6f6f5c1cc6d99d42a2cf304321320680927d255807c63d34c382def5e43a

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    439778766c961464c2298dd34a6837a6

    SHA1

    46b6f5ec094329a53c1b19fc9abbcbed20abf6c4

    SHA256

    66bbc6c2e345f29810a573d98587c82302fed045a8bde5f3c2a7601a139a0a94

    SHA512

    c03fde3464c8782541deab06c45bd5f4259a22fe9e499f458afb0ad0b8266ee95ca743fb6507904558b88341887045f8d7100e52757be02384891d9c1b762cf5

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2216-17-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2216-9-0x00000000002B0000-0x00000000002B8000-memory.dmp

    Filesize

    32KB

  • memory/2216-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2216-71-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2216-64-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2216-59-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2216-31-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2216-57-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2216-36-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2216-4-0x00000000002B0000-0x00000000002B8000-memory.dmp

    Filesize

    32KB

  • memory/2752-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-58-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-60-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-25-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-65-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-77-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2752-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB