Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 12:30

General

  • Target

    4aafdf00c039442993b3f62da1bb692ecfef219e73c05e0613f8f7c2d5b47e5f.exe

  • Size

    573KB

  • MD5

    91071af657e8f3ff71e5171e96d1b2e0

  • SHA1

    e9ccab81aaa323a6d53ea62f252aeb28745374b1

  • SHA256

    4aafdf00c039442993b3f62da1bb692ecfef219e73c05e0613f8f7c2d5b47e5f

  • SHA512

    234a3a4227f808112a5f1a571c719e157987883afe657622ce0942661d70c7762fb9e302cf39aede322d8a7985c6b02a92040b5e10812f7b50b72501583b0191

  • SSDEEP

    6144:7tMcZQNxogdOmTq2tfBTgBcJhbn5s0bgGqvfNa6soxqw6U4k6+8rNp6t2:2hds2t5sBan5skgGsNns8fKrNp6E

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Allows Network login with blank passwords 1 TTPs 1 IoCs

    Allows local user accounts with blank passwords to access device from the network.

  • Deletes itself 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4aafdf00c039442993b3f62da1bb692ecfef219e73c05e0613f8f7c2d5b47e5f.exe
    "C:\Users\Admin\AppData\Local\Temp\4aafdf00c039442993b3f62da1bb692ecfef219e73c05e0613f8f7c2d5b47e5f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\cdbyNmvCqDXxYbt.exe
      C:\Users\Admin\AppData\Local\Temp\4aafdf00c039442993b3f62da1bb692ecfef219e73c05e0613f8f7c2d5b47e5f.exe
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      PID:992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\cdbyNmvCqDXxYbt.exe

    Filesize

    573KB

    MD5

    91071af657e8f3ff71e5171e96d1b2e0

    SHA1

    e9ccab81aaa323a6d53ea62f252aeb28745374b1

    SHA256

    4aafdf00c039442993b3f62da1bb692ecfef219e73c05e0613f8f7c2d5b47e5f

    SHA512

    234a3a4227f808112a5f1a571c719e157987883afe657622ce0942661d70c7762fb9e302cf39aede322d8a7985c6b02a92040b5e10812f7b50b72501583b0191

  • C:\Windows\cdbyNmvCqDXxYbt.exe

    Filesize

    573KB

    MD5

    91071af657e8f3ff71e5171e96d1b2e0

    SHA1

    e9ccab81aaa323a6d53ea62f252aeb28745374b1

    SHA256

    4aafdf00c039442993b3f62da1bb692ecfef219e73c05e0613f8f7c2d5b47e5f

    SHA512

    234a3a4227f808112a5f1a571c719e157987883afe657622ce0942661d70c7762fb9e302cf39aede322d8a7985c6b02a92040b5e10812f7b50b72501583b0191

  • memory/592-66-0x00000000003E0000-0x000000000041F000-memory.dmp

    Filesize

    252KB

  • memory/592-71-0x000007FEFBEE1000-0x000007FEFBEE3000-memory.dmp

    Filesize

    8KB

  • memory/592-70-0x0000000000420000-0x0000000000464000-memory.dmp

    Filesize

    272KB

  • memory/592-67-0x0000000000420000-0x0000000000464000-memory.dmp

    Filesize

    272KB

  • memory/992-65-0x0000000000400000-0x0000000000493000-memory.dmp

    Filesize

    588KB

  • memory/992-68-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2028-61-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2028-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/2028-56-0x0000000000401000-0x0000000000404000-memory.dmp

    Filesize

    12KB

  • memory/2028-55-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB