Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 07:19

General

  • Target

    88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe

  • Size

    96KB

  • MD5

    54284d3c667dd6a26da9598714047caa

  • SHA1

    a24f0cd36dcf926aaf34892e91bcf6789d770fc6

  • SHA256

    88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1

  • SHA512

    151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4

  • SSDEEP

    768:s06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:yR0vxn3Pc0LCH9MtbvabUDzJYWu3B

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe
    "C:\Users\Admin\AppData\Local\Temp\88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Program Files (x86)\Microsoft\WaterMark.exe
      "C:\Program Files (x86)\Microsoft\WaterMark.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:4408
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 204
            4⤵
            • Program crash
            PID:4080
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3592
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3592 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:404
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4724
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4724 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4408 -ip 4408
      1⤵
        PID:2012

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        96KB

        MD5

        54284d3c667dd6a26da9598714047caa

        SHA1

        a24f0cd36dcf926aaf34892e91bcf6789d770fc6

        SHA256

        88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1

        SHA512

        151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4

      • C:\Program Files (x86)\Microsoft\WaterMark.exe

        Filesize

        96KB

        MD5

        54284d3c667dd6a26da9598714047caa

        SHA1

        a24f0cd36dcf926aaf34892e91bcf6789d770fc6

        SHA256

        88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1

        SHA512

        151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        7550b85aee4221c59808672005ed8855

        SHA1

        aeb269eff06f518132b9ecea824523fa125ba2d2

        SHA256

        2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

        SHA512

        216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        76304245133133855caba6a2c3a885b9

        SHA1

        615989f13e05f5e29d2e5b1cd16afb198354606a

        SHA256

        d7552a1c4793b803dfba3a21638fefd3792c184a5248dc4d95122ef11a13aa19

        SHA512

        35d0fc3d9e82cbbbb12dc124daec7ccd90e61cb6f07a7807cc773eb70b61fcd230790678a25e8c673234ba42417c11a792d84b188077b6d31453aa1292741407

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{17FB6F8E-518D-11ED-B696-E64E24383C5C}.dat

        Filesize

        3KB

        MD5

        51e991a710d0c8100dd6dacf6f46ca8d

        SHA1

        5fb55edba9d05bb23c9d9ae6388df51ed8448094

        SHA256

        e2694addf8caea3a42958458f8366c25c75c14d3c50eb6d633af21d5cabfa813

        SHA512

        c58e3cdbad4bcd20056fa7ea10eea202100eb6e91ae4dad08f8afea6b1fdc604e4e35b334376d4f03f4a1db96c09a4e08921b798e1d263092c9f7bc44aaa8c7f

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{17FDD116-518D-11ED-B696-E64E24383C5C}.dat

        Filesize

        3KB

        MD5

        b7dbfd83607f68c0232425b1f03e5d00

        SHA1

        f81bd0f99252059fc8c237a61b8021310c154799

        SHA256

        2f0d3feb891d51b5987582c0e827d5c6bd8ad42e610e8b643cb5cb32bc9d6d31

        SHA512

        9990d722959c18f2bd7e5dfe723afd11f0f0cbc744a82b2d238619cfac3310cec07834a0e571e2b00fbbdcd9b7c8dfa6885c625f1b375983206b5b18b5a77773

      • memory/4800-148-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4800-146-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4800-149-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4800-150-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4800-151-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4800-152-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4800-153-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4800-147-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/4892-134-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4892-139-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/4892-135-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB