Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 11:06

General

  • Target

    2a78722fd24eab24791ebe36ea286bb9f00fa1d0edebed2f6c72ab1396e0c5d2.exe

  • Size

    166KB

  • MD5

    bf45f27a403acfd3847fbbae88a8375f

  • SHA1

    06bd4a8895b0dd88a04e7de03e3f1f362e33d518

  • SHA256

    2a78722fd24eab24791ebe36ea286bb9f00fa1d0edebed2f6c72ab1396e0c5d2

  • SHA512

    d851d35fd317fd1dfaf7deb6c5e2530af38976271d859cc81532bd9e7c766fccbb24ca0063c3336be29597617da96e92a6da688e4c26c4f17294f8ce45cb42c0

  • SSDEEP

    3072:4cNLL5QPHSlkC0y3fOl0W7nbiCIiptMm7SmAXNzSrCdIfUEyPnmVhOQVEX4:4cNLLyvSlWy3e7nVjtMInGCsE2YkQV

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\2a78722fd24eab24791ebe36ea286bb9f00fa1d0edebed2f6c72ab1396e0c5d2.exe
        "C:\Users\Admin\AppData\Local\Temp\2a78722fd24eab24791ebe36ea286bb9f00fa1d0edebed2f6c72ab1396e0c5d2.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1700
        • \??\c:\users\admin\appdata\local\temp\2a78722fd24eab24791ebe36ea286bb9f00fa1d0edebed2f6c72ab1396e0c5d2.exe
          "c:\users\admin\appdata\local\temp\2a78722fd24eab24791ebe36ea286bb9f00fa1d0edebed2f6c72ab1396e0c5d2.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1124
          • C:\Users\Admin\AppData\Roaming\Leafwi\enzo.exe
            "C:\Users\Admin\AppData\Roaming\Leafwi\enzo.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:276
            • \??\c:\users\admin\appdata\roaming\leafwi\enzo.exe
              "c:\users\admin\appdata\roaming\leafwi\enzo.exe"
              5⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1912
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb29381d4.bat"
            4⤵
            • Deletes itself
            PID:1316
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1180
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1112
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
          1⤵
            PID:284
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:1696

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmpb29381d4.bat

              Filesize

              307B

              MD5

              7ea525382c2497e2fa92f4bfc2f77bae

              SHA1

              f14527984805839ed58104731e369532e167be0b

              SHA256

              828f48e58c3acce7d7ebb77c08fd8820733cae8d414c37d0dbdb44b158053a0d

              SHA512

              8ec16dc11143a7cf75d656a093713c45cc44e9d275134cd0644a7980a20c7d40edca03786b8a9cd8c066faca2ff657d29e02ade511f07b986144e1c1d8a5a4b1

            • C:\Users\Admin\AppData\Roaming\Leafwi\enzo.exe

              Filesize

              166KB

              MD5

              98a6e43ed34b09ca03e126ced6d7fe4f

              SHA1

              56b76ef210142b024e2d03d2b610f3a3d408d637

              SHA256

              abb4a50678dabfefa4f22f247884a80bc07c8346d2fc8f07dd6d5080507e3088

              SHA512

              a53e1bc1e0856f59ee11ee0bfddf9be9216ae747d31f4b5392f10062c5890ae69ebf4ed92b893790fdf7b33e1efe82335082191b4bfd73c03432e405b6b3394f

            • C:\Users\Admin\AppData\Roaming\Leafwi\enzo.exe

              Filesize

              166KB

              MD5

              98a6e43ed34b09ca03e126ced6d7fe4f

              SHA1

              56b76ef210142b024e2d03d2b610f3a3d408d637

              SHA256

              abb4a50678dabfefa4f22f247884a80bc07c8346d2fc8f07dd6d5080507e3088

              SHA512

              a53e1bc1e0856f59ee11ee0bfddf9be9216ae747d31f4b5392f10062c5890ae69ebf4ed92b893790fdf7b33e1efe82335082191b4bfd73c03432e405b6b3394f

            • \??\c:\users\admin\appdata\roaming\leafwi\enzo.exe

              Filesize

              166KB

              MD5

              98a6e43ed34b09ca03e126ced6d7fe4f

              SHA1

              56b76ef210142b024e2d03d2b610f3a3d408d637

              SHA256

              abb4a50678dabfefa4f22f247884a80bc07c8346d2fc8f07dd6d5080507e3088

              SHA512

              a53e1bc1e0856f59ee11ee0bfddf9be9216ae747d31f4b5392f10062c5890ae69ebf4ed92b893790fdf7b33e1efe82335082191b4bfd73c03432e405b6b3394f

            • \Users\Admin\AppData\Roaming\Leafwi\enzo.exe

              Filesize

              166KB

              MD5

              98a6e43ed34b09ca03e126ced6d7fe4f

              SHA1

              56b76ef210142b024e2d03d2b610f3a3d408d637

              SHA256

              abb4a50678dabfefa4f22f247884a80bc07c8346d2fc8f07dd6d5080507e3088

              SHA512

              a53e1bc1e0856f59ee11ee0bfddf9be9216ae747d31f4b5392f10062c5890ae69ebf4ed92b893790fdf7b33e1efe82335082191b4bfd73c03432e405b6b3394f

            • \Users\Admin\AppData\Roaming\Leafwi\enzo.exe

              Filesize

              166KB

              MD5

              98a6e43ed34b09ca03e126ced6d7fe4f

              SHA1

              56b76ef210142b024e2d03d2b610f3a3d408d637

              SHA256

              abb4a50678dabfefa4f22f247884a80bc07c8346d2fc8f07dd6d5080507e3088

              SHA512

              a53e1bc1e0856f59ee11ee0bfddf9be9216ae747d31f4b5392f10062c5890ae69ebf4ed92b893790fdf7b33e1efe82335082191b4bfd73c03432e405b6b3394f

            • memory/284-106-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/284-107-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/284-108-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/284-109-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/1112-89-0x0000000001BC0000-0x0000000001BE7000-memory.dmp

              Filesize

              156KB

            • memory/1112-87-0x0000000001BC0000-0x0000000001BE7000-memory.dmp

              Filesize

              156KB

            • memory/1112-90-0x0000000001BC0000-0x0000000001BE7000-memory.dmp

              Filesize

              156KB

            • memory/1112-88-0x0000000001BC0000-0x0000000001BE7000-memory.dmp

              Filesize

              156KB

            • memory/1124-58-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/1124-64-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/1124-60-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/1124-63-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

              Filesize

              8KB

            • memory/1124-65-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/1124-54-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/1124-85-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/1124-55-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/1124-57-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/1180-95-0x0000000001AC0000-0x0000000001AE7000-memory.dmp

              Filesize

              156KB

            • memory/1180-96-0x0000000001AC0000-0x0000000001AE7000-memory.dmp

              Filesize

              156KB

            • memory/1180-94-0x0000000001AC0000-0x0000000001AE7000-memory.dmp

              Filesize

              156KB

            • memory/1180-93-0x0000000001AC0000-0x0000000001AE7000-memory.dmp

              Filesize

              156KB

            • memory/1208-102-0x00000000025F0000-0x0000000002617000-memory.dmp

              Filesize

              156KB

            • memory/1208-101-0x00000000025F0000-0x0000000002617000-memory.dmp

              Filesize

              156KB

            • memory/1208-103-0x00000000025F0000-0x0000000002617000-memory.dmp

              Filesize

              156KB

            • memory/1208-100-0x00000000025F0000-0x0000000002617000-memory.dmp

              Filesize

              156KB

            • memory/1696-112-0x0000000003A50000-0x0000000003A77000-memory.dmp

              Filesize

              156KB

            • memory/1696-113-0x0000000003A50000-0x0000000003A77000-memory.dmp

              Filesize

              156KB

            • memory/1696-114-0x0000000003A50000-0x0000000003A77000-memory.dmp

              Filesize

              156KB

            • memory/1696-115-0x0000000003A50000-0x0000000003A77000-memory.dmp

              Filesize

              156KB

            • memory/1912-86-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB

            • memory/1912-116-0x0000000000400000-0x0000000000427000-memory.dmp

              Filesize

              156KB