Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 21:04

General

  • Target

    11ef342e68a998229d5669a9d886a7d2019f36cd8fcd908e80f83a7898575f9b.exe

  • Size

    151KB

  • MD5

    5b348bf3acb336b3c9dbbd1ce9660f20

  • SHA1

    8aa4f4df37f57c5246bc6c31fd048088a8ff0323

  • SHA256

    11ef342e68a998229d5669a9d886a7d2019f36cd8fcd908e80f83a7898575f9b

  • SHA512

    731d55c29c8ae315f83ffa65d8211d6aeb5f7a29b66323ed0e82efd36e6bd56c7a947536898740a3d491dae2c1754befc505be14ec0cc6c534821b76a5f9d68c

  • SSDEEP

    3072:7q5UOGKNYWx8ebsrf/EEEG9WFzFUcTc5/0+wmDq+Sg4:+5UO2Ac6Fzal0+wmDGg4

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11ef342e68a998229d5669a9d886a7d2019f36cd8fcd908e80f83a7898575f9b.exe
    "C:\Users\Admin\AppData\Local\Temp\11ef342e68a998229d5669a9d886a7d2019f36cd8fcd908e80f83a7898575f9b.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Program Files\Microsoft Office\Root\Office16\winword.exe
      "C:\Program Files\Microsoft Office\Root\Office16\winword.exe"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1692-133-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/4740-138-0x00007FFC3FC30000-0x00007FFC3FC40000-memory.dmp

    Filesize

    64KB

  • memory/4740-134-0x00007FFC3FC30000-0x00007FFC3FC40000-memory.dmp

    Filesize

    64KB

  • memory/4740-136-0x00007FFC3FC30000-0x00007FFC3FC40000-memory.dmp

    Filesize

    64KB

  • memory/4740-135-0x00007FFC3FC30000-0x00007FFC3FC40000-memory.dmp

    Filesize

    64KB

  • memory/4740-137-0x00007FFC3FC30000-0x00007FFC3FC40000-memory.dmp

    Filesize

    64KB

  • memory/4740-139-0x00007FFC3D500000-0x00007FFC3D510000-memory.dmp

    Filesize

    64KB

  • memory/4740-140-0x00007FFC3D500000-0x00007FFC3D510000-memory.dmp

    Filesize

    64KB

  • memory/4740-142-0x00007FFC3FC30000-0x00007FFC3FC40000-memory.dmp

    Filesize

    64KB

  • memory/4740-143-0x00007FFC3FC30000-0x00007FFC3FC40000-memory.dmp

    Filesize

    64KB

  • memory/4740-144-0x00007FFC3FC30000-0x00007FFC3FC40000-memory.dmp

    Filesize

    64KB

  • memory/4740-145-0x00007FFC3FC30000-0x00007FFC3FC40000-memory.dmp

    Filesize

    64KB