Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 07:15

General

  • Target

    aed2724e96b3cdc0f8d8a195190943d4c84d5f4ae885789c0565f5028b43c446.exe

  • Size

    14.4MB

  • MD5

    943173db3aa141e8cf0dfee172640cba

  • SHA1

    700ddc8cc34f619b8e0f97daacc83dd41bad17f6

  • SHA256

    aed2724e96b3cdc0f8d8a195190943d4c84d5f4ae885789c0565f5028b43c446

  • SHA512

    b667989f8194f8e1577789e8f4b4e89475d6f5fa2d6dd21727ef3b2486842e1de98bcba18128e3faa44410e269a67cc7a903d62b9eb89c72ad3b6bb2c20309df

  • SSDEEP

    393216:2K1D1R/h2It9Z9InNkDKPHPQ4Ww1Rwc20:Rp1L2IV9InNk0/FRwW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\is-0DC6H.tmp\aed2724e96b3cdc0f8d8a195190943d4c84d5f4ae885789c0565f5028b43c446.tmp
    "C:\Users\Admin\AppData\Local\Temp\is-0DC6H.tmp\aed2724e96b3cdc0f8d8a195190943d4c84d5f4ae885789c0565f5028b43c446.tmp" /SL5="$80122,14878246,56832,C:\Users\Admin\AppData\Local\Temp\aed2724e96b3cdc0f8d8a195190943d4c84d5f4ae885789c0565f5028b43c446.exe"
    1⤵
    • Executes dropped EXE
    PID:1548
    • C:\Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\7za.exe
      "C:\Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\7za.exe" -p5463 x plushdpt_.exe -t7z
      2⤵
        PID:1492
      • C:\Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\plushdpt.exe
        "C:\Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\plushdpt.exe"
        2⤵
          PID:884
          • C:\Users\Admin\AppData\Local\Temp\nsoFFB5.tmp\Nifdn.exe
            "C:\Users\Admin\AppData\Local\Temp\nsoFFB5.tmp\Nifdn.exe"
            3⤵
              PID:544
        • C:\Users\Admin\AppData\Local\Temp\aed2724e96b3cdc0f8d8a195190943d4c84d5f4ae885789c0565f5028b43c446.exe
          "C:\Users\Admin\AppData\Local\Temp\aed2724e96b3cdc0f8d8a195190943d4c84d5f4ae885789c0565f5028b43c446.exe"
          1⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1096

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-0DC6H.tmp\aed2724e96b3cdc0f8d8a195190943d4c84d5f4ae885789c0565f5028b43c446.tmp

          Filesize

          15KB

          MD5

          08722dee77586e2fe9cec29f70d92155

          SHA1

          0a715782514bca90343658ff35f6c0b5c7afa604

          SHA256

          3fb9c6fe0d3ca35b1ed87d9fbf80682305ae43038931ed7860d7ba6a5b11cabc

          SHA512

          6e59572835b7de264d0a91bc7dec4f729b7d391cf88a06244af4c6a0e0fdbf3934fdb1b97671757e77986af615f79a73ccd2ebdadad5507ea75bc42de36616da

        • C:\Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\7za.exe

          Filesize

          18KB

          MD5

          b679f62896221ede1f73284ef55aaddb

          SHA1

          9920afcaef3129774fd27f4b5b3cc1e39359855d

          SHA256

          c0b33f3f985fbbb8032865cf8b4e43bc936f83efff16b1c10f1e57d0bde2f2c8

          SHA512

          22c414994bd467c9f409451fa9b6b600f2bc362341afa4f9452ee5f9f0c54f79994a0187896a806ef0bb57fc2c5ac67dac2558f2c4197bd1b09cce6aa675d52c

        • C:\Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\plushdpt.exe

          Filesize

          15KB

          MD5

          99b409d46bd577e93bd8c30b52dedb54

          SHA1

          34dec2f8dde76442fb4f816efa502479405dfd3c

          SHA256

          a2b9a05bf3ba859968e187b3171957fcecc54b7cccbcd55d548799220e540f98

          SHA512

          e36059227a91950a7710d89718d264508907366e314deb58d34a14a85018006ce3598f2f43821c4bf4cd7770cccc57392536999152351edf94ef437ae532f446

        • C:\Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\plushdpt.exe

          Filesize

          16KB

          MD5

          b911090954fe522f51d80d69656a6d60

          SHA1

          ab1c20ec787b80b3158e56a9056d92df320df3a4

          SHA256

          da4d975ce969ce29962d35d845e94c34b3bece5c9ee705829e82551f7173e85e

          SHA512

          d2c1bb7fc1701230aed4dec840e23036be7805604d63b686b4d37c5b816b230b915efbe726d589151daa1cbbe90eb745aaf511ba2585316987de057df052e8a1

        • C:\Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\plushdpt_.exe

          Filesize

          41KB

          MD5

          c0bb45990cf6a01aeda9388a2e3cf2be

          SHA1

          ef015b253dd52cf8c0a1128280e033e823a33150

          SHA256

          bb788526bf1bd7ae360967a2bb769969df4fe784dfdb06a6933e86339311eb2e

          SHA512

          f068e5c2e54ebf5999ef369cc9150c4f3d161596473a1b78416b118360aca9d017c456854816b29cd4e3939f60627f749a992a24c018ad9c03e6333eb88c37dc

        • C:\Users\Admin\AppData\Local\Temp\nsoFFB5.tmp\Nifdn.exe

          Filesize

          21KB

          MD5

          a449a8374223b38bc654c18ec32fcff1

          SHA1

          d7cb42775c5807fcea4df9dd197dd32f55c5f9bd

          SHA256

          54f44033861f252e6ad1f110770f6fb3cf7fd28e6906c7fac1fec8be920b44e0

          SHA512

          4f1bb40bf3cd9a0e39f71943523d8471650106bc0a91a8ccbaceb0397e4222925f7e11a136cdb3dd0b9f4ae542d674bc704dd58c4ff42639b7b098ea4e57470b

        • C:\Users\Admin\AppData\Local\Temp\nsoFFB5.tmp\Nifdn.exe

          Filesize

          32KB

          MD5

          3e89b89531d7b0d5c6f3712123d3acc1

          SHA1

          0cde794d8e20f58e3dc76175e45a1a74228b9d95

          SHA256

          b7dd07f6502a19acd6dc7a1289c5759f0b57c5ed0c14a991e144cf63c9db6e2c

          SHA512

          6f3535e24151b534745559fe15ebfe4b63927b32b3bd141a71800b728a08a80d47fd9af511091ba1f2b184fcac954301a911461fed6f33c3c582f4f5cb54ba2f

        • \Users\Admin\AppData\Local\Temp\is-0DC6H.tmp\aed2724e96b3cdc0f8d8a195190943d4c84d5f4ae885789c0565f5028b43c446.tmp

          Filesize

          18KB

          MD5

          4fbe2cd4e24bc30459222f015bc67901

          SHA1

          aad3839b4752356fa4ebee4f203f9169ab776a7d

          SHA256

          8b29acdb397da5934b8e0e5388b747e61d00282e2f16e5dbbf0ad28162c1e7af

          SHA512

          e7dee0f92c83b05dbd259c172d33568b14f8a027dc831628f657e61155841089a2e0f73c2e20ba00f808bb6fdef25e4c192209a77e5d6800acf5fa9068034404

        • \Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\7za.exe

          Filesize

          7KB

          MD5

          3ee055fa794d585830a1d06721d2f0b6

          SHA1

          bf246bbc9dfdcbf03d8695b54289d2e69f12f293

          SHA256

          7c332ff95549ec1b0d4dad305bc3c64f8fe2dd0b1cf3ed88de99b441287dab80

          SHA512

          7ca33e9b03139412d375161f6e80a3a5c5b70297d8d456dd38bb93d1484532da22000e853375f6253064c46de24a2208fb699d67de68bc112acc27142e204b3c

        • \Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\7za.exe

          Filesize

          38KB

          MD5

          08164c469419f7396a5168ae90e9b056

          SHA1

          b20e1a6909dc0274618b33d985f31e5adfa06447

          SHA256

          e49d5d0f8313e91e79f4d142936b9433a31681ab76569b44201b7c6fba103ee9

          SHA512

          6fb14ed387c3ce9f9010b8843deea39385b8374b38c901c8d35604c15233a116a0875bb1175a12dd830902b6662782e83c2ecf956dede24f75cfa0ecd1c9ac6c

        • \Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\_isetup\_shfoldr.dll

          Filesize

          6KB

          MD5

          ffeab424b02491b52bee51e03099523b

          SHA1

          3b1e593fadb0c78f39fea320bac1cd1ee39c441d

          SHA256

          ff9b791858ab8fb207fc5e03cceafd46491d03a70b1166577f0d87f3ce64d1c8

          SHA512

          66c288ed3a3ce5794f9fdc07ab090112ebcfce548cf3748966bb521973481123fb161892e08b193426925efac43f8d83d4d89d3af3e0e1f0b065bcfc49bc975a

        • \Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\_isetup\_shfoldr.dll

          Filesize

          20KB

          MD5

          c7923bbd5db746da17184dbba09add09

          SHA1

          7865c5c0c37360b8dde569470b7e558f44c855a2

          SHA256

          bcdab2c86ecc6705e591f4a9bd7a674b51b0d0f9f276d54cea1afea9cef1c3ee

          SHA512

          f2e8c00dd552eb1456a90c5455d78b09ccde82d6dd4aa6ca998758ade9ee838560dd2ae4d2aa6c8fed09b7b4bcb015d83bf5b2297209841586b58ed9f1df22d3

        • \Users\Admin\AppData\Local\Temp\is-BGOPB.tmp\plushdpt.exe

          Filesize

          18KB

          MD5

          6096c3d80daec66757849845de7d8795

          SHA1

          a245ebd976fa141b7041cc6df1acf5e37ffe1906

          SHA256

          c45f26d63634c955affd4a74c9dfe58f88cd1d83a29074a17113c5cd0c703591

          SHA512

          df74a7fd5a3554ef0c97f2fc7046b5b20a727f7568ab0184873ae6132fe34b508064854ef1253f1082013cf68e82d21bec392882c679e479ba466048c0f3d0ab

        • \Users\Admin\AppData\Local\Temp\nso496.tmp\ayudqei.dll

          Filesize

          25KB

          MD5

          08a94ad471441452826cbc743c44b24c

          SHA1

          68a778faec9bf7d4b6f6b2bff25ab28a320d7aac

          SHA256

          58420533cf531b6be567a5ad1244af8b2b40aea64fde48cde5f4ff0eaf16ad00

          SHA512

          89bdb2b4df6d03bd62f59fdee15659f1cc71751deebae01532ed6a4155882f17942c92d42687803753db5f56dba03e5781a8bff8fc4ac6ed23c55cc1fa5f38a3

        • \Users\Admin\AppData\Local\Temp\nso496.tmp\dugls.dll

          Filesize

          11KB

          MD5

          00a0194c20ee912257df53bfe258ee4a

          SHA1

          d7b4e319bc5119024690dc8230b9cc919b1b86b2

          SHA256

          dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

          SHA512

          3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

        • \Users\Admin\AppData\Local\Temp\nso496.tmp\rryceabgt.dll

          Filesize

          12KB

          MD5

          ae2b97cf79ebb128f2c0253b5ce2049e

          SHA1

          eeed83bcb4e416c04334f6e8c1cfbe7653e5262b

          SHA256

          64066a068f3328dc19e4eda665458b1a3fe67498e82ec59d249526e71989de0a

          SHA512

          7e4a1ed98e78bfa8fbd36d9824b2a097d074aeb583853669a576aa3feb6c645845ad5e3e5733fa4a468c5f3df120023cdc7323f7889c4399711a1c2619978b33

        • \Users\Admin\AppData\Local\Temp\nsoFFB5.tmp\Nifdn.exe

          Filesize

          10KB

          MD5

          a00cb81c9fbba4ef6766e9a56981bd3a

          SHA1

          1fcfda6391f1deff343bdbe5f742bd67f2981804

          SHA256

          db2d0354da525b53710b61e22036c7c989fee8c5e6992da8db7a988ac8e0d581

          SHA512

          5964c9e76534436b348d1ee9e680de8b91f587e92bd305736b4cc564db1472a9337f9e4d95924fb2a28420955e3c5f0dc252e59d058bbc1e7412a25b1d60272b

        • \Users\Admin\AppData\Local\Temp\nsoFFB5.tmp\dugls.dll

          Filesize

          11KB

          MD5

          00a0194c20ee912257df53bfe258ee4a

          SHA1

          d7b4e319bc5119024690dc8230b9cc919b1b86b2

          SHA256

          dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

          SHA512

          3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

        • \Users\Admin\AppData\Local\Temp\nsoFFB5.tmp\emdwyhiv.dll

          Filesize

          14KB

          MD5

          55b0fc16b745c373288ed62dca9b1a11

          SHA1

          fd1b3f02334ab351063fac6e57199a3e8ce01e53

          SHA256

          40f8cec72d50643d75e798fe53da5e56d5791a6fc803392464f0848d475ef142

          SHA512

          82b30c078877b9e3c0e2a0948065220997479d261112a386f86790b6ef03842c8e49e307991b5673d4be78ec68ab08ff31d28faf655c7a4907cb028a4774380b

        • \Users\Admin\AppData\Local\Temp\nsoFFB5.tmp\rryceabgt.dll

          Filesize

          14KB

          MD5

          21010df9bc37daffcc0b5ae190381d85

          SHA1

          a8ba022aafc1233894db29e40e569dfc8b280eb9

          SHA256

          0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

          SHA512

          95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

        • memory/1096-55-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1096-54-0x0000000075211000-0x0000000075213000-memory.dmp

          Filesize

          8KB

        • memory/1096-63-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB