Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 14:39

General

  • Target

    51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe

  • Size

    240KB

  • MD5

    505eaf14f4a7dbbcac1abd97526e9b20

  • SHA1

    8b2ea1bb7aa669cdf5d8d739ed1963bcd7f2cdbb

  • SHA256

    51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e

  • SHA512

    4c05db784c4d150b19d9955b6b24f5043038597130bdbc6e0f6547f0f6437c43503fa5bca02a2a124e7936144fb50859e9f5b894a66a63e6821719232b699f70

  • SSDEEP

    3072:O0PfBwAPkBX6EZGroxsIKZ3rYg3Q2xCGyJ9zX5gZLY:O0GAcBqEoroxsIKpphVq9zJL

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe
    "C:\Users\Admin\AppData\Local\Temp\51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Users\Admin\AppData\Local\Temp\51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe
      "C:\Users\Admin\AppData\Local\Temp\51a8932c266b564b4a373e3b0371d8424f56ebd495c488af9aa8b6014781d51e.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:488
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Adds Run key to start application
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:812
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:5092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    046bedf3b97e782edc5343dc24a1c485

    SHA1

    ebad04906d01fdb00719463e729f201a043433ae

    SHA256

    4bb13178dccf62921053ef1b62f9bdb994dfd0520741873a60ac2c1484df78ca

    SHA512

    18203014488892166d7c331f8239c1c030fd9831b8040d51b3fdf3d887f867380ff639ccac26e8751b7b13d1dc83e2931f96019783695e7a93c4348046c9fabf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    fbfeb6f5b6875d3d502540df73a160ca

    SHA1

    cc890ba05fbe1cd6e8f636a628f168fe62933d9e

    SHA256

    97d77f231b79134c91adb26cf964745c3063348ebb5ea6a6c7ed933335cebafc

    SHA512

    782b00186f6593ef054d406c4d8d970a43d8cc1d4ffbe13e7ea4a0a07f34ccce3da2a369bc8aeedce1356b6d2ababebf2a56f7e72d7c010e3b79d877ef9f1f1a

  • memory/488-134-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/488-136-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/488-137-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/488-139-0x0000000002730000-0x000000000277F000-memory.dmp

    Filesize

    316KB

  • memory/488-140-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/4760-132-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/4760-138-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB