Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 22:04

General

  • Target

    a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe

  • Size

    300KB

  • MD5

    a20120062a1ddb5abf58c674ad023660

  • SHA1

    33c042aaf21b64229a3ee8fa00390f96c67a9714

  • SHA256

    a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b

  • SHA512

    539a89f245ceb6ec9cfc520fd0d982cc3f25c61f3862013e112d3d98bfa5cc7ad1334672ca2ce329c3a08d1b8662ab2a6a4a8f58c75285602408f7c63a2e55cb

  • SSDEEP

    6144:UlSWnu93+NLuC6vKljOuf+DrIhoG5L/hztBOMygTikuu:AGq6vKQDEi6J9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe
        "C:\Users\Admin\AppData\Local\Temp\a250e5c0152c27b19be7a907c8d8ba856b1fced391d4cc680e5cd2fc6913823b.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1348
        • C:\Users\Admin\AppData\Roaming\Kuycbi\awtavo.exe
          "C:\Users\Admin\AppData\Roaming\Kuycbi\awtavo.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2032
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfba18cea.bat"
          3⤵
          • Deletes itself
          PID:1104
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1164
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1068

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpfba18cea.bat

          Filesize

          307B

          MD5

          a438056e9b87e98d5be4a60b4f0459a1

          SHA1

          0a45e0936c62acbcf0ceecd0e0578b91c0da87b0

          SHA256

          97089e5ac1b2b9cd8b62c3c5c8fb4c4e7eecfb482e20c135bde2fd41e21c307d

          SHA512

          84ed95ea7b2c5fff6c93f44335da7ba65d8d4890529f75d5556de0e978f820570a392200c0941b0332e970c239504ed12231607fcd295def63f2a86943c7e588

        • C:\Users\Admin\AppData\Roaming\Kuycbi\awtavo.exe

          Filesize

          300KB

          MD5

          dcf95b379361a2c34dd58ad10b188afd

          SHA1

          bf91da89c4ecad4b0014816e903267a8cb6fcca6

          SHA256

          45e7d1490fde91e0aef20bd528ced411134014433795aabeda0ea68f1993a4fe

          SHA512

          34124d0a77fe4f502a8be411125cf1155c4caed59a801951720d767e5129e85d4bc142cb0f59971c3ef4706580661b950d2f3d80f0d0e1171d1dab15c2a83329

        • C:\Users\Admin\AppData\Roaming\Kuycbi\awtavo.exe

          Filesize

          300KB

          MD5

          dcf95b379361a2c34dd58ad10b188afd

          SHA1

          bf91da89c4ecad4b0014816e903267a8cb6fcca6

          SHA256

          45e7d1490fde91e0aef20bd528ced411134014433795aabeda0ea68f1993a4fe

          SHA512

          34124d0a77fe4f502a8be411125cf1155c4caed59a801951720d767e5129e85d4bc142cb0f59971c3ef4706580661b950d2f3d80f0d0e1171d1dab15c2a83329

        • \Users\Admin\AppData\Roaming\Kuycbi\awtavo.exe

          Filesize

          300KB

          MD5

          dcf95b379361a2c34dd58ad10b188afd

          SHA1

          bf91da89c4ecad4b0014816e903267a8cb6fcca6

          SHA256

          45e7d1490fde91e0aef20bd528ced411134014433795aabeda0ea68f1993a4fe

          SHA512

          34124d0a77fe4f502a8be411125cf1155c4caed59a801951720d767e5129e85d4bc142cb0f59971c3ef4706580661b950d2f3d80f0d0e1171d1dab15c2a83329

        • \Users\Admin\AppData\Roaming\Kuycbi\awtavo.exe

          Filesize

          300KB

          MD5

          dcf95b379361a2c34dd58ad10b188afd

          SHA1

          bf91da89c4ecad4b0014816e903267a8cb6fcca6

          SHA256

          45e7d1490fde91e0aef20bd528ced411134014433795aabeda0ea68f1993a4fe

          SHA512

          34124d0a77fe4f502a8be411125cf1155c4caed59a801951720d767e5129e85d4bc142cb0f59971c3ef4706580661b950d2f3d80f0d0e1171d1dab15c2a83329

        • memory/1068-68-0x0000000000230000-0x0000000000278000-memory.dmp

          Filesize

          288KB

        • memory/1068-70-0x0000000000230000-0x0000000000278000-memory.dmp

          Filesize

          288KB

        • memory/1068-69-0x0000000000230000-0x0000000000278000-memory.dmp

          Filesize

          288KB

        • memory/1068-65-0x0000000000230000-0x0000000000278000-memory.dmp

          Filesize

          288KB

        • memory/1068-67-0x0000000000230000-0x0000000000278000-memory.dmp

          Filesize

          288KB

        • memory/1104-100-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1104-105-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1104-113-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1104-99-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1104-101-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1104-97-0x0000000000050000-0x0000000000098000-memory.dmp

          Filesize

          288KB

        • memory/1104-111-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1104-110-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1104-109-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1104-108-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1104-107-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1104-106-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1164-76-0x0000000001CC0000-0x0000000001D08000-memory.dmp

          Filesize

          288KB

        • memory/1164-75-0x0000000001CC0000-0x0000000001D08000-memory.dmp

          Filesize

          288KB

        • memory/1164-74-0x0000000001CC0000-0x0000000001D08000-memory.dmp

          Filesize

          288KB

        • memory/1164-73-0x0000000001CC0000-0x0000000001D08000-memory.dmp

          Filesize

          288KB

        • memory/1208-81-0x0000000002AA0000-0x0000000002AE8000-memory.dmp

          Filesize

          288KB

        • memory/1208-82-0x0000000002AA0000-0x0000000002AE8000-memory.dmp

          Filesize

          288KB

        • memory/1208-79-0x0000000002AA0000-0x0000000002AE8000-memory.dmp

          Filesize

          288KB

        • memory/1208-80-0x0000000002AA0000-0x0000000002AE8000-memory.dmp

          Filesize

          288KB

        • memory/1348-103-0x0000000001E60000-0x0000000001EA8000-memory.dmp

          Filesize

          288KB

        • memory/1348-85-0x0000000001E60000-0x0000000001EA8000-memory.dmp

          Filesize

          288KB

        • memory/1348-55-0x0000000000401000-0x0000000000441000-memory.dmp

          Filesize

          256KB

        • memory/1348-89-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1348-88-0x0000000001E60000-0x0000000001EA8000-memory.dmp

          Filesize

          288KB

        • memory/1348-92-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1348-91-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1348-90-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1348-87-0x0000000001E60000-0x0000000001EA8000-memory.dmp

          Filesize

          288KB

        • memory/1348-86-0x0000000001E60000-0x0000000001EA8000-memory.dmp

          Filesize

          288KB

        • memory/1348-56-0x0000000075601000-0x0000000075603000-memory.dmp

          Filesize

          8KB

        • memory/1348-94-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1348-93-0x000000006FFF0000-0x0000000070000000-memory.dmp

          Filesize

          64KB

        • memory/1348-54-0x0000000000400000-0x0000000000451000-memory.dmp

          Filesize

          324KB