Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    86s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 12:22

Errors

Reason
Machine shutdown

General

  • Target

    0a9361657db620a5517ff3d39cb49744ce422819f191a637311f2b79fea5802f.exe

  • Size

    46KB

  • MD5

    2dd14afcc7e1566980af3e1485109f9c

  • SHA1

    77fb3de68b63bd8e0a05277dc6b858fa7384a860

  • SHA256

    0a9361657db620a5517ff3d39cb49744ce422819f191a637311f2b79fea5802f

  • SHA512

    fe9497d2fae6e8ff677c90d37d00237590f6b48b893dfbec6d7b5dcd473202133836fbcf7f669f4e4442eead15cac557316b4f47e497cc9aa49751927cffc5b0

  • SSDEEP

    768:0C38y4disgWSU1YlmDPoYSbRR9P+srOTrG:0CR4ggSU1Y4PoB+sC

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a9361657db620a5517ff3d39cb49744ce422819f191a637311f2b79fea5802f.exe
    "C:\Users\Admin\AppData\Local\Temp\0a9361657db620a5517ff3d39cb49744ce422819f191a637311f2b79fea5802f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Users\Admin\AppData\Local\Temp\0a9361657db620a5517ff3d39cb49744ce422819f191a637311f2b79fea5802f.exe
      "C:\Users\Admin\AppData\Local\Temp\0a9361657db620a5517ff3d39cb49744ce422819f191a637311f2b79fea5802f.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Users\Admin\AppData\Local\Temp\x2z8.exe
        C:\Users\Admin\AppData\Local\Temp\\x2z8.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3692
        • C:\Users\Admin\AppData\Local\Temp\x2z8.exe
          "C:\Users\Admin\AppData\Local\Temp\x2z8.exe"
          4⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of AdjustPrivilegeToken
          PID:852
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39d9055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:3476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fpath.txt

    Filesize

    102B

    MD5

    89f26c68f71323d51c7c61fad807955f

    SHA1

    93b4d24ee03d702cabc3bfe02e24dadc0a7b689f

    SHA256

    87d0767ec44e138da222453596dbb86f62dd1c23685ec17cf9d66e0af56640d4

    SHA512

    6a800f63b020424230e82359c8a9fa959b3ad2db73c4c7bccb4c5e3bf4fea4f5ab9ead55b5b9a9ef3c07ea1be127ec5aefd9d11229de5ceb1b9e84c66f313ad3

  • C:\Users\Admin\AppData\Local\Temp\x2z8.exe

    Filesize

    46KB

    MD5

    2dd14afcc7e1566980af3e1485109f9c

    SHA1

    77fb3de68b63bd8e0a05277dc6b858fa7384a860

    SHA256

    0a9361657db620a5517ff3d39cb49744ce422819f191a637311f2b79fea5802f

    SHA512

    fe9497d2fae6e8ff677c90d37d00237590f6b48b893dfbec6d7b5dcd473202133836fbcf7f669f4e4442eead15cac557316b4f47e497cc9aa49751927cffc5b0

  • C:\Users\Admin\AppData\Local\Temp\x2z8.exe

    Filesize

    46KB

    MD5

    2dd14afcc7e1566980af3e1485109f9c

    SHA1

    77fb3de68b63bd8e0a05277dc6b858fa7384a860

    SHA256

    0a9361657db620a5517ff3d39cb49744ce422819f191a637311f2b79fea5802f

    SHA512

    fe9497d2fae6e8ff677c90d37d00237590f6b48b893dfbec6d7b5dcd473202133836fbcf7f669f4e4442eead15cac557316b4f47e497cc9aa49751927cffc5b0

  • C:\Users\Admin\AppData\Local\Temp\x2z8.exe

    Filesize

    46KB

    MD5

    2dd14afcc7e1566980af3e1485109f9c

    SHA1

    77fb3de68b63bd8e0a05277dc6b858fa7384a860

    SHA256

    0a9361657db620a5517ff3d39cb49744ce422819f191a637311f2b79fea5802f

    SHA512

    fe9497d2fae6e8ff677c90d37d00237590f6b48b893dfbec6d7b5dcd473202133836fbcf7f669f4e4442eead15cac557316b4f47e497cc9aa49751927cffc5b0

  • memory/852-146-0x000000002AA00000-0x000000002AA04000-memory.dmp

    Filesize

    16KB

  • memory/4496-133-0x000000002AA00000-0x000000002AA04000-memory.dmp

    Filesize

    16KB

  • memory/4496-135-0x000000002AA00000-0x000000002AA04000-memory.dmp

    Filesize

    16KB

  • memory/4496-138-0x000000002AA00000-0x000000002AA04000-memory.dmp

    Filesize

    16KB