Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 19:16

General

  • Target

    efbe29e7e508ee4a69a8d7d113e52c624cf4e78dc0a8c6d8e74b3b9b86a07ba9.exe

  • Size

    177KB

  • MD5

    9021ed3f00f1be5bb1a49a14b0ad2120

  • SHA1

    8ad1db39b58f422e3fb58e3bc4eee19842474597

  • SHA256

    efbe29e7e508ee4a69a8d7d113e52c624cf4e78dc0a8c6d8e74b3b9b86a07ba9

  • SHA512

    966c51b3a35260f31c02f51211a5ce4f036569b6f87533665809afe39e0f000c955df5097c568a9ce0fff78d6c108d6e87a466de1acc0e806554a60a6f56a14e

  • SSDEEP

    1536:9C8tA5z5MS62cxVfLVFio+HETUjBEikc94vNUNT+piHJO5cghLjJzK:xAhlbcDziW4/kvfp+oFzK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efbe29e7e508ee4a69a8d7d113e52c624cf4e78dc0a8c6d8e74b3b9b86a07ba9.exe
    "C:\Users\Admin\AppData\Local\Temp\efbe29e7e508ee4a69a8d7d113e52c624cf4e78dc0a8c6d8e74b3b9b86a07ba9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Roaming\Acknkn.exe
      "C:\Users\Admin\AppData\Roaming\Acknkn.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:368
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4408
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4408 CREDAT:17410 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2260
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:4620

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      6a15e3564b9eb382fe5534f59d6fccb4

      SHA1

      911dbc1a988c2d6816beb0c21c4ea5402253b884

      SHA256

      6b478c66c9a2024177d4a478ccea9a82f3162aa87a5125a0dc3750c920bdbc62

      SHA512

      2801f46d495eed08dbb10e73ccda4828faf4ef6b1ff3ff45ce8d73331e692381c25417d15c958f8c3f9c6932300cd0e66b1aad6bb5a92e2bf27b338b6d245711

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      6adc2eb805cfb91b039b22243bf5c61b

      SHA1

      6400a9f7649cc64fefac17da8e5fe51022a741ed

      SHA256

      a440ceb98d27136c0663bb15de7bcf8ca9876a64250d61af2347ea6f72199566

      SHA512

      99b36d3678aa4f00f6a298cbc5eedf74cf486a5beb479d64358a984d74898ff8d99bad4193103acd8a06877f1e5d76becfa617dfe6f161ed9bb42e01d5806dde

    • C:\Users\Admin\AppData\Roaming\Acknkn.exe

      Filesize

      177KB

      MD5

      9021ed3f00f1be5bb1a49a14b0ad2120

      SHA1

      8ad1db39b58f422e3fb58e3bc4eee19842474597

      SHA256

      efbe29e7e508ee4a69a8d7d113e52c624cf4e78dc0a8c6d8e74b3b9b86a07ba9

      SHA512

      966c51b3a35260f31c02f51211a5ce4f036569b6f87533665809afe39e0f000c955df5097c568a9ce0fff78d6c108d6e87a466de1acc0e806554a60a6f56a14e

    • C:\Users\Admin\AppData\Roaming\Acknkn.exe

      Filesize

      177KB

      MD5

      9021ed3f00f1be5bb1a49a14b0ad2120

      SHA1

      8ad1db39b58f422e3fb58e3bc4eee19842474597

      SHA256

      efbe29e7e508ee4a69a8d7d113e52c624cf4e78dc0a8c6d8e74b3b9b86a07ba9

      SHA512

      966c51b3a35260f31c02f51211a5ce4f036569b6f87533665809afe39e0f000c955df5097c568a9ce0fff78d6c108d6e87a466de1acc0e806554a60a6f56a14e

    • memory/1484-136-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1484-132-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1484-140-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1484-135-0x0000000002850000-0x0000000002866000-memory.dmp

      Filesize

      88KB

    • memory/1484-133-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4580-141-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4580-143-0x0000000000A70000-0x0000000000A86000-memory.dmp

      Filesize

      88KB

    • memory/4580-144-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4580-145-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB