Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    179s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 15:55

General

  • Target

    9185d51c49beb7e35e23e18a73a7123b610b9ecce69163d370557f1cdf8d9100.exe

  • Size

    208KB

  • MD5

    0a1bc443b6f97a768dfe3a5202c0bbe0

  • SHA1

    825c747d3c8990b2180edf51c305661ae438deae

  • SHA256

    9185d51c49beb7e35e23e18a73a7123b610b9ecce69163d370557f1cdf8d9100

  • SHA512

    ab69992ccfe4f92e75a10ad46f2368eefd982dd15311a196fb9830412d7ff26127accb03d89c615496e8b6e041906d283402c6c1fa750380348a9b07c52d1662

  • SSDEEP

    3072:MXgL+OnCA2JLxEAWLR0lGacNcP7hUPT0w8n0Eb1OSoefWlIv:QgC2A/6tdNixnDJoeU

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9185d51c49beb7e35e23e18a73a7123b610b9ecce69163d370557f1cdf8d9100.exe
    "C:\Users\Admin\AppData\Local\Temp\9185d51c49beb7e35e23e18a73a7123b610b9ecce69163d370557f1cdf8d9100.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\9185d51c49beb7e35e23e18a73a7123b610b9ecce69163d370557f1cdf8d9100.exe
      "C:\Users\Admin\AppData\Local\Temp\9185d51c49beb7e35e23e18a73a7123b610b9ecce69163d370557f1cdf8d9100.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\UHLGE.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "chrome.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\temp\chrome.exe" /f
          4⤵
          • Adds Run key to start application
          PID:1096
      • C:\Users\Admin\AppData\Roaming\temp\chrome.exe
        "C:\Users\Admin\AppData\Roaming\temp\chrome.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Users\Admin\AppData\Roaming\temp\chrome.exe
          "C:\Users\Admin\AppData\Roaming\temp\chrome.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:308
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:672
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:672 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\UHLGE.bat

    Filesize

    143B

    MD5

    809151c6427bb50acddfd3ab4ef9514b

    SHA1

    d8786a949c372f73750463aab728dd3cf5306813

    SHA256

    02432a4daa99ee328c69a509aaa5cc87a7eb1faa6f465361720dccd33e8e8e86

    SHA512

    1eb057896dee7d2beb3e70040f011a12f63e9036e388f168bf9d573620bdb1e6977e7749f1645ed58a0896ed50769dbd0785e21c358ecd16f0c3cab856356ead

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\JDESLKDL.txt

    Filesize

    608B

    MD5

    5c49a852f9babe0a525145746a2979ec

    SHA1

    e24ee8bffa30864a21a2735dc8ffaf61cde894a0

    SHA256

    c0dd65d9880f33121ae1a0ed8d7b8203800ee484d5ddff43e391821310376b00

    SHA512

    1871706a8bd9e297e0e35787688fe4e0afc837d1b9a1422fe78202263332218b82ab1656709f7594b6f4196893a3d646bb23779aa92b3037992d1a08cab308f4

  • C:\Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    d3e74ccefc4376f02415c268bb56e000

    SHA1

    6e175ce21ef8b22de7129e929128f74c8b42fcc7

    SHA256

    dc9619ef81abf7995077c7d3cacc0db3f47fc793cdc40616ba9bc6cb36a45352

    SHA512

    4b961dc281684f3e6d417bb6aa78104f7f3ba1e9e68c5c56b04aade7a8cb66c2e09c4fe87df49b2a4e768ea70e62e9403ef0789e19f22c204b214675c891ecf8

  • C:\Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    d3e74ccefc4376f02415c268bb56e000

    SHA1

    6e175ce21ef8b22de7129e929128f74c8b42fcc7

    SHA256

    dc9619ef81abf7995077c7d3cacc0db3f47fc793cdc40616ba9bc6cb36a45352

    SHA512

    4b961dc281684f3e6d417bb6aa78104f7f3ba1e9e68c5c56b04aade7a8cb66c2e09c4fe87df49b2a4e768ea70e62e9403ef0789e19f22c204b214675c891ecf8

  • C:\Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    d3e74ccefc4376f02415c268bb56e000

    SHA1

    6e175ce21ef8b22de7129e929128f74c8b42fcc7

    SHA256

    dc9619ef81abf7995077c7d3cacc0db3f47fc793cdc40616ba9bc6cb36a45352

    SHA512

    4b961dc281684f3e6d417bb6aa78104f7f3ba1e9e68c5c56b04aade7a8cb66c2e09c4fe87df49b2a4e768ea70e62e9403ef0789e19f22c204b214675c891ecf8

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    d3e74ccefc4376f02415c268bb56e000

    SHA1

    6e175ce21ef8b22de7129e929128f74c8b42fcc7

    SHA256

    dc9619ef81abf7995077c7d3cacc0db3f47fc793cdc40616ba9bc6cb36a45352

    SHA512

    4b961dc281684f3e6d417bb6aa78104f7f3ba1e9e68c5c56b04aade7a8cb66c2e09c4fe87df49b2a4e768ea70e62e9403ef0789e19f22c204b214675c891ecf8

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    d3e74ccefc4376f02415c268bb56e000

    SHA1

    6e175ce21ef8b22de7129e929128f74c8b42fcc7

    SHA256

    dc9619ef81abf7995077c7d3cacc0db3f47fc793cdc40616ba9bc6cb36a45352

    SHA512

    4b961dc281684f3e6d417bb6aa78104f7f3ba1e9e68c5c56b04aade7a8cb66c2e09c4fe87df49b2a4e768ea70e62e9403ef0789e19f22c204b214675c891ecf8

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    d3e74ccefc4376f02415c268bb56e000

    SHA1

    6e175ce21ef8b22de7129e929128f74c8b42fcc7

    SHA256

    dc9619ef81abf7995077c7d3cacc0db3f47fc793cdc40616ba9bc6cb36a45352

    SHA512

    4b961dc281684f3e6d417bb6aa78104f7f3ba1e9e68c5c56b04aade7a8cb66c2e09c4fe87df49b2a4e768ea70e62e9403ef0789e19f22c204b214675c891ecf8

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    d3e74ccefc4376f02415c268bb56e000

    SHA1

    6e175ce21ef8b22de7129e929128f74c8b42fcc7

    SHA256

    dc9619ef81abf7995077c7d3cacc0db3f47fc793cdc40616ba9bc6cb36a45352

    SHA512

    4b961dc281684f3e6d417bb6aa78104f7f3ba1e9e68c5c56b04aade7a8cb66c2e09c4fe87df49b2a4e768ea70e62e9403ef0789e19f22c204b214675c891ecf8

  • \Users\Admin\AppData\Roaming\temp\chrome.exe

    Filesize

    208KB

    MD5

    d3e74ccefc4376f02415c268bb56e000

    SHA1

    6e175ce21ef8b22de7129e929128f74c8b42fcc7

    SHA256

    dc9619ef81abf7995077c7d3cacc0db3f47fc793cdc40616ba9bc6cb36a45352

    SHA512

    4b961dc281684f3e6d417bb6aa78104f7f3ba1e9e68c5c56b04aade7a8cb66c2e09c4fe87df49b2a4e768ea70e62e9403ef0789e19f22c204b214675c891ecf8

  • memory/308-101-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/308-99-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1212-56-0x00000000005CF000-0x00000000005EE000-memory.dmp

    Filesize

    124KB

  • memory/1452-83-0x000000000059F000-0x00000000005BE000-memory.dmp

    Filesize

    124KB

  • memory/1472-65-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1472-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1472-61-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1472-59-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1472-66-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1472-98-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1472-69-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1472-70-0x0000000075EC1000-0x0000000075EC3000-memory.dmp

    Filesize

    8KB

  • memory/1472-58-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB