Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 21:57

General

  • Target

    0f30c72aa90ceb22296efa5d32601661362d1d1e4b14b31d871983c022bb6d7a.exe

  • Size

    1.2MB

  • MD5

    2f1520c8e9712fcd9bbf3bede3214705

  • SHA1

    ff308d1805bcfb4c918557202c41ce3b5041e83a

  • SHA256

    0f30c72aa90ceb22296efa5d32601661362d1d1e4b14b31d871983c022bb6d7a

  • SHA512

    219a3e9bf03475fe63b8179ba2540676b98080c189b90044d21fdc73c1d126f242922c25213b2efa375ce4af448c6343c59abaae50be76b1cffeabf2eb8dd422

  • SSDEEP

    24576:+AHnh+eWsN3skA4RV1Hom2KXMmHaVuXN+K48s0f2FZh4YXY4Vuk5:ph+ZkldoPK8YaVuXN+K5Hf2FZC7OJ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f30c72aa90ceb22296efa5d32601661362d1d1e4b14b31d871983c022bb6d7a.exe
    "C:\Users\Admin\AppData\Local\Temp\0f30c72aa90ceb22296efa5d32601661362d1d1e4b14b31d871983c022bb6d7a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ping 192.168.88.252 > C:\Users\Admin\AppData\Local\Temp\20221012000122.txt
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:284
      • C:\Windows\SysWOW64\PING.EXE
        ping 192.168.88.252
        3⤵
        • Runs ping.exe
        PID:888
    • C:\Users\Admin\AppData\Local\Temp\FastCopy.exe
      C:\Users\Admin\AppData\Local\Temp\FastCopy.exe /cmd=sync /force_close \\192.168.88.252\share\pos\app\xampp.exe /to=C:\pos\app\
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\FastCopy.exe

    Filesize

    615KB

    MD5

    c3674b33eca2cc6f24ff6151b0ee8d2e

    SHA1

    b3a8c5aa023dfddfdf8c907a0279569cf98cad33

    SHA256

    9fad6ecf28bcd69afe32fc615efb8a136aec8694d732abacbc2b148e781f46c1

    SHA512

    0657f04d43b44a971be328b337b5ee511c48d0a86de90854eea78f7df647b7724e7c1655e516f6a4cca8214a8132783f2f6e501d457af8bb0a16685805e07467

  • \Users\Admin\AppData\Local\Temp\FastCopy.exe

    Filesize

    615KB

    MD5

    c3674b33eca2cc6f24ff6151b0ee8d2e

    SHA1

    b3a8c5aa023dfddfdf8c907a0279569cf98cad33

    SHA256

    9fad6ecf28bcd69afe32fc615efb8a136aec8694d732abacbc2b148e781f46c1

    SHA512

    0657f04d43b44a971be328b337b5ee511c48d0a86de90854eea78f7df647b7724e7c1655e516f6a4cca8214a8132783f2f6e501d457af8bb0a16685805e07467

  • memory/736-54-0x0000000076201000-0x0000000076203000-memory.dmp

    Filesize

    8KB

  • memory/1324-61-0x00000000743C1000-0x00000000743C3000-memory.dmp

    Filesize

    8KB