Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

07/09/2021, 17:26

210907-vzzaxsdae6 10

07/09/2021, 13:18

210907-qkaa2acfe3 10

06/09/2021, 17:52

210906-wfz9jsbch4 10

06/09/2021, 17:51

210906-wfnwhsbch3 10

06/09/2021, 13:27

210906-qp3hdaedaj 10

06/09/2021, 09:28

210906-lfpgyaeael 10

06/09/2021, 04:33

210906-e6mmpsaaa2 10

05/09/2021, 05:25

210905-f4h26sfab6 10

04/09/2021, 21:32

210904-1dqdsahfdj 10

04/09/2021, 21:19

210904-z56z6shfck 10

Analysis

  • max time kernel
    26s
  • max time network
    1719s
  • platform
    windows10_x64
  • resource
    win10-fr
  • submitted
    06/09/2021, 04:33

General

  • Target

    setup_x86_x64_install.exe

  • Size

    2.2MB

  • MD5

    e3b3a95ef03de0de77cca7a54ea22c94

  • SHA1

    d318d234f8f27f25de660d9881113df9d11c24ff

  • SHA256

    baa381f572d293636b6e48cacd2cd6a6f4f9e5f71c583873260f6ac01f0f5e15

  • SHA512

    3c1c6254f14491bc2cb096d8b46d0d65e096dac331bab2df9c5b173271eef1b9a9deb831f212a0117fab16665277208d0c1b5183ea600cc2bbe6f9049c57ad0d

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3940
      • C:\Users\Admin\AppData\Local\Temp\7zS46F6E8E3\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS46F6E8E3\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3872
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4188
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Fri156ec98815f89c.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1996
          • C:\Users\Admin\AppData\Local\Temp\7zS46F6E8E3\Fri156ec98815f89c.exe
            Fri156ec98815f89c.exe
            5⤵
            • Executes dropped EXE
            PID:4200
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Fri155442fc38b.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:8
          • C:\Users\Admin\AppData\Local\Temp\7zS46F6E8E3\Fri155442fc38b.exe
            Fri155442fc38b.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4276
            • C:\Users\Admin\AppData\Roaming\2127950.exe
              "C:\Users\Admin\AppData\Roaming\2127950.exe"
              6⤵
              • Executes dropped EXE
              PID:4792
            • C:\Users\Admin\AppData\Roaming\3384081.exe
              "C:\Users\Admin\AppData\Roaming\3384081.exe"
              6⤵
              • Executes dropped EXE
              PID:4868
            • C:\Users\Admin\AppData\Roaming\2381092.exe
              "C:\Users\Admin\AppData\Roaming\2381092.exe"
              6⤵
              • Executes dropped EXE
              PID:4988
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Fri15af75ee9b.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4116
          • C:\Users\Admin\AppData\Local\Temp\7zS46F6E8E3\Fri15af75ee9b.exe
            Fri15af75ee9b.exe
            5⤵
            • Executes dropped EXE
            PID:4296
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Fri1553f0ee90.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4156
          • C:\Users\Admin\AppData\Local\Temp\7zS46F6E8E3\Fri1553f0ee90.exe
            Fri1553f0ee90.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4368
            • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
              "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4728
              • C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe
                "C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"
                7⤵
                • Executes dropped EXE
                PID:4944
              • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe
                "C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"
                7⤵
                  PID:5048
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c APPNAME7.exe
            4⤵
              PID:4136
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Fri157e25afd971.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2236
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Fri1544861ac3fe6a.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3740
      • C:\Users\Admin\AppData\Local\Temp\7zS46F6E8E3\Fri1544861ac3fe6a.exe
        Fri1544861ac3fe6a.exe
        1⤵
        • Executes dropped EXE
        PID:4212
      • C:\Users\Admin\AppData\Local\Temp\7zS46F6E8E3\Fri157e25afd971.exe
        Fri157e25afd971.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Users\Admin\AppData\Local\Temp\is-8IC1T.tmp\Fri157e25afd971.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-8IC1T.tmp\Fri157e25afd971.tmp" /SL5="$20086,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS46F6E8E3\Fri157e25afd971.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4468
          • C:\Users\Admin\AppData\Local\Temp\is-ICACI.tmp\zab2our.exe
            "C:\Users\Admin\AppData\Local\Temp\is-ICACI.tmp\zab2our.exe" /S /UID=burnerch2
            3⤵
            • Executes dropped EXE
            PID:4804

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2124-134-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/2124-131-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2124-136-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/2124-137-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/2124-135-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/2124-132-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/2124-133-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/4188-195-0x0000000008600000-0x0000000008601000-memory.dmp

        Filesize

        4KB

      • memory/4188-192-0x0000000008180000-0x0000000008181000-memory.dmp

        Filesize

        4KB

      • memory/4188-209-0x0000000008670000-0x0000000008671000-memory.dmp

        Filesize

        4KB

      • memory/4188-179-0x0000000007240000-0x0000000007241000-memory.dmp

        Filesize

        4KB

      • memory/4188-181-0x0000000007410000-0x0000000007411000-memory.dmp

        Filesize

        4KB

      • memory/4188-173-0x0000000004C00000-0x0000000004C01000-memory.dmp

        Filesize

        4KB

      • memory/4188-184-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

        Filesize

        4KB

      • memory/4188-175-0x00000000074E0000-0x00000000074E1000-memory.dmp

        Filesize

        4KB

      • memory/4188-187-0x0000000007390000-0x0000000007391000-memory.dmp

        Filesize

        4KB

      • memory/4188-190-0x0000000007D70000-0x0000000007D71000-memory.dmp

        Filesize

        4KB

      • memory/4188-191-0x00000000081D0000-0x00000000081D1000-memory.dmp

        Filesize

        4KB

      • memory/4188-186-0x0000000007B80000-0x0000000007B81000-memory.dmp

        Filesize

        4KB

      • memory/4188-185-0x0000000004BF2000-0x0000000004BF3000-memory.dmp

        Filesize

        4KB

      • memory/4188-183-0x0000000007B10000-0x0000000007B11000-memory.dmp

        Filesize

        4KB

      • memory/4248-170-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/4276-178-0x000000001BD40000-0x000000001BD41000-memory.dmp

        Filesize

        4KB

      • memory/4276-188-0x000000001B920000-0x000000001B922000-memory.dmp

        Filesize

        8KB

      • memory/4276-177-0x0000000002A00000-0x0000000002A16000-memory.dmp

        Filesize

        88KB

      • memory/4276-194-0x000000001B650000-0x000000001B651000-memory.dmp

        Filesize

        4KB

      • memory/4276-168-0x0000000000B10000-0x0000000000B11000-memory.dmp

        Filesize

        4KB

      • memory/4368-182-0x000000001B720000-0x000000001B722000-memory.dmp

        Filesize

        8KB

      • memory/4368-166-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

        Filesize

        4KB

      • memory/4468-189-0x00000000001E0000-0x00000000001E1000-memory.dmp

        Filesize

        4KB

      • memory/4728-198-0x0000000000740000-0x0000000000741000-memory.dmp

        Filesize

        4KB

      • memory/4792-206-0x0000000000D60000-0x0000000000D61000-memory.dmp

        Filesize

        4KB

      • memory/4792-222-0x0000000002DA0000-0x0000000002DDE000-memory.dmp

        Filesize

        248KB

      • memory/4804-215-0x0000000001270000-0x0000000001272000-memory.dmp

        Filesize

        8KB

      • memory/4868-216-0x00000000003E0000-0x00000000003E1000-memory.dmp

        Filesize

        4KB

      • memory/4868-224-0x00000000024E0000-0x00000000024E1000-memory.dmp

        Filesize

        4KB

      • memory/4944-217-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

        Filesize

        4KB