Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    98s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 10:32

General

  • Target

    a64a3a8591ad7ba44eab193cf1f94497cc991b5157764436d402556ae16df80e.exe

  • Size

    1.3MB

  • MD5

    285c79620e135fa78dc4f5649f14d0c0

  • SHA1

    fd8619f46583f82427f0405dcaac35a507d270ba

  • SHA256

    a64a3a8591ad7ba44eab193cf1f94497cc991b5157764436d402556ae16df80e

  • SHA512

    2c46a1e8785accc934ac046ac6ef92a6f50b046db1dfa19e912b68c603ffb7e9a966324d819a529e44c4ca1cd746288031f7a1c179e7970d713880fc8cb5dded

  • SSDEEP

    12288:AdpJ16Gna4Y6REllPaa5LiIU/fsh4V6jnB0KJFx+I3IxAOzK6+44EwgwIVM12cn4:AdpJxZmllg

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:480
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1340
      • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
        wmiadap.exe /F /T /R
        1⤵
          PID:2028
        • C:\Windows\system32\sppsvc.exe
          C:\Windows\system32\sppsvc.exe
          1⤵
            PID:1620
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
            1⤵
              PID:1184
            • C:\Windows\Explorer.EXE
              C:\Windows\Explorer.EXE
              1⤵
                PID:1380
                • C:\Users\Admin\AppData\Local\Temp\a64a3a8591ad7ba44eab193cf1f94497cc991b5157764436d402556ae16df80e.exe
                  "C:\Users\Admin\AppData\Local\Temp\a64a3a8591ad7ba44eab193cf1f94497cc991b5157764436d402556ae16df80e.exe"
                  2⤵
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1788
              • C:\Windows\system32\taskhost.exe
                "taskhost.exe"
                1⤵
                  PID:1240
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                  1⤵
                    PID:1044
                  • C:\Windows\System32\spoolsv.exe
                    C:\Windows\System32\spoolsv.exe
                    1⤵
                      PID:304
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k NetworkService
                      1⤵
                        PID:336
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs
                        1⤵
                          PID:880
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService
                          1⤵
                            PID:848
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                            1⤵
                              PID:812
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                              1⤵
                                PID:768
                                • C:\Windows\system32\AUDIODG.EXE
                                  C:\Windows\system32\AUDIODG.EXE 0x51c
                                  2⤵
                                    PID:1452
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k RPCSS
                                  1⤵
                                    PID:680
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k DcomLaunch
                                    1⤵
                                      PID:600
                                    • C:\Windows\system32\lsm.exe
                                      C:\Windows\system32\lsm.exe
                                      1⤵
                                        PID:488
                                      • C:\Windows\system32\services.exe
                                        C:\Windows\system32\services.exe
                                        1⤵
                                          PID:460
                                        • C:\Windows\system32\winlogon.exe
                                          winlogon.exe
                                          1⤵
                                            PID:416
                                          • C:\Windows\system32\csrss.exe
                                            %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                            1⤵
                                              PID:380
                                            • C:\Windows\system32\wininit.exe
                                              wininit.exe
                                              1⤵
                                                PID:368

                                              Network

                                              MITRE ATT&CK Matrix

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • \Windows\SysWOW64\dplaysvr.exe

                                                Filesize

                                                55KB

                                                MD5

                                                68a07875b3dd1b917ba163c55cdb3e3c

                                                SHA1

                                                6d28b468d85cf2c9209ac2752334e1596c124fdb

                                                SHA256

                                                b5d649a822b1862c271bbb6d22f7891b044756d9282bcf4b38ebb3989a635834

                                                SHA512

                                                2220e06bb29ecb507ae5b99e108f15ab1cfdcc582fafdf80f2d3d80e07c10ffd2614d52ee772633b12d8aa37349fb44759aaa0e20db44f236667c4866c49655c

                                              • \Windows\SysWOW64\dplaysvr.exe

                                                Filesize

                                                55KB

                                                MD5

                                                68a07875b3dd1b917ba163c55cdb3e3c

                                                SHA1

                                                6d28b468d85cf2c9209ac2752334e1596c124fdb

                                                SHA256

                                                b5d649a822b1862c271bbb6d22f7891b044756d9282bcf4b38ebb3989a635834

                                                SHA512

                                                2220e06bb29ecb507ae5b99e108f15ab1cfdcc582fafdf80f2d3d80e07c10ffd2614d52ee772633b12d8aa37349fb44759aaa0e20db44f236667c4866c49655c

                                              • \Windows\SysWOW64\dpnsvr.exe

                                                Filesize

                                                59KB

                                                MD5

                                                c7752bd0272b3d657563c0ad37ee8d8b

                                                SHA1

                                                d2b949c20695900260ef59b21d4b472272542a3c

                                                SHA256

                                                bac9e6606ed514980f2b75bf4e61ad7d6298e6430850d6858508dd1b9a95d3b5

                                                SHA512

                                                62c37be704bf395b92816328b2723e8735035cdbdcc14a91bf0afb616928d04c9b67e45315ffd9a85b181fe570870c42ee56b9e018ac801fd34e08bb4167ffae

                                              • \Windows\SysWOW64\dpnsvr.exe

                                                Filesize

                                                59KB

                                                MD5

                                                c7752bd0272b3d657563c0ad37ee8d8b

                                                SHA1

                                                d2b949c20695900260ef59b21d4b472272542a3c

                                                SHA256

                                                bac9e6606ed514980f2b75bf4e61ad7d6298e6430850d6858508dd1b9a95d3b5

                                                SHA512

                                                62c37be704bf395b92816328b2723e8735035cdbdcc14a91bf0afb616928d04c9b67e45315ffd9a85b181fe570870c42ee56b9e018ac801fd34e08bb4167ffae

                                              • memory/1788-68-0x0000000003810000-0x000000000386C000-memory.dmp

                                                Filesize

                                                368KB

                                              • memory/1788-71-0x0000000002EE0000-0x0000000002EF2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/1788-55-0x0000000001000000-0x0000000001147000-memory.dmp

                                                Filesize

                                                1.3MB

                                              • memory/1788-63-0x0000000002EE0000-0x0000000002EF3000-memory.dmp

                                                Filesize

                                                76KB

                                              • memory/1788-62-0x0000000002EE0000-0x0000000002EF2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/1788-61-0x0000000002EE0000-0x0000000002EF2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/1788-64-0x0000000002EE0000-0x0000000002EF3000-memory.dmp

                                                Filesize

                                                76KB

                                              • memory/1788-65-0x0000000002EF0000-0x0000000002EFA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/1788-66-0x0000000002EF0000-0x0000000002EFA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/1788-69-0x0000000003810000-0x000000000386C000-memory.dmp

                                                Filesize

                                                368KB

                                              • memory/1788-54-0x00000000761F1000-0x00000000761F3000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/1788-67-0x0000000003810000-0x000000000386C000-memory.dmp

                                                Filesize

                                                368KB

                                              • memory/1788-70-0x0000000002EE0000-0x0000000002EF2000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/1788-56-0x0000000001000000-0x0000000001147000-memory.dmp

                                                Filesize

                                                1.3MB

                                              • memory/1788-72-0x0000000002EE0000-0x0000000002EF3000-memory.dmp

                                                Filesize

                                                76KB

                                              • memory/1788-73-0x0000000002EE0000-0x0000000002EF3000-memory.dmp

                                                Filesize

                                                76KB

                                              • memory/1788-75-0x0000000002EF0000-0x0000000002EFA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/1788-74-0x0000000002EF0000-0x0000000002EFA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/1788-77-0x0000000003810000-0x000000000386C000-memory.dmp

                                                Filesize

                                                368KB

                                              • memory/1788-78-0x0000000003810000-0x000000000386C000-memory.dmp

                                                Filesize

                                                368KB

                                              • memory/1788-79-0x0000000003810000-0x000000000386C000-memory.dmp

                                                Filesize

                                                368KB

                                              • memory/1788-76-0x00000000035F0000-0x00000000035FA000-memory.dmp

                                                Filesize

                                                40KB

                                              • memory/1788-80-0x0000000003810000-0x000000000386C000-memory.dmp

                                                Filesize

                                                368KB

                                              • memory/1788-81-0x0000000003BB0000-0x0000000003BDA000-memory.dmp

                                                Filesize

                                                168KB

                                              • memory/1788-82-0x0000000003BB0000-0x0000000003BDA000-memory.dmp

                                                Filesize

                                                168KB

                                              • memory/1788-83-0x0000000003BB0000-0x0000000003BDA000-memory.dmp

                                                Filesize

                                                168KB

                                              • memory/1788-84-0x0000000003BB0000-0x0000000003BDA000-memory.dmp

                                                Filesize

                                                168KB