Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    154s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 23:53

General

  • Target

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2.exe

  • Size

    100KB

  • MD5

    466b8767482c92dbd55789a6541083c0

  • SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

  • SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

  • SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • SSDEEP

    1536:84Jf83W8W60IL26AppJSmc0z11Mc2//qCCguJgGXTA9:NJCD54pJSn44c2qCJuJggA9

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Executes dropped EXE 7 IoCs
  • Adds Run key to start application 2 TTPs 16 IoCs
  • Drops file in System32 directory 12 IoCs
  • Drops file in Windows directory 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2.exe
    "C:\Users\Admin\AppData\Local\Temp\b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Users\Admin\AppData\Local\Temp\bk_CA4A.tmp
      C:\Users\Admin\AppData\Local\Temp\bk_CA4A.tmp
      2⤵
      • Executes dropped EXE
      PID:2264
    • C:\Windows\system\Fun.exe
      C:\Windows\system\Fun.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4156
      • C:\Users\Admin\AppData\Local\Temp\bk_D15E.tmp
        C:\Users\Admin\AppData\Local\Temp\bk_D15E.tmp
        3⤵
        • Executes dropped EXE
        PID:4316
      • C:\Windows\SVIQ.EXE
        C:\Windows\SVIQ.EXE
        3⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4544
        • C:\Users\Admin\AppData\Local\Temp\bk_D333.tmp
          C:\Users\Admin\AppData\Local\Temp\bk_D333.tmp
          4⤵
          • Executes dropped EXE
          PID:364
    • C:\Windows\dc.exe
      C:\Windows\dc.exe
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4384
      • C:\Users\Admin\AppData\Local\Temp\bk_D69E.tmp
        C:\Users\Admin\AppData\Local\Temp\bk_D69E.tmp
        3⤵
        • Executes dropped EXE
        PID:216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bk_CA4A.tmp

    Filesize

    37KB

    MD5

    f1fe537ac62d4855a28aa36600514066

    SHA1

    6ff9e5014bbe388a2113ce046481511198932dda

    SHA256

    a28a2c442b61b60682ea3c200ad3169b7a95338d1cc888eaa4eb855d3119d4a4

    SHA512

    0bc4b286a1fc5b66f2e4455990bf988a0b38295f6fbd269459a6c7259a3b11fee16ee054ab4c5b510e8ae7800189321d20d4261131221cf88cd341c77c5732d6

  • C:\Users\Admin\AppData\Local\Temp\bk_D15E.tmp

    Filesize

    37KB

    MD5

    f1fe537ac62d4855a28aa36600514066

    SHA1

    6ff9e5014bbe388a2113ce046481511198932dda

    SHA256

    a28a2c442b61b60682ea3c200ad3169b7a95338d1cc888eaa4eb855d3119d4a4

    SHA512

    0bc4b286a1fc5b66f2e4455990bf988a0b38295f6fbd269459a6c7259a3b11fee16ee054ab4c5b510e8ae7800189321d20d4261131221cf88cd341c77c5732d6

  • C:\Users\Admin\AppData\Local\Temp\bk_D333.tmp

    Filesize

    37KB

    MD5

    f1fe537ac62d4855a28aa36600514066

    SHA1

    6ff9e5014bbe388a2113ce046481511198932dda

    SHA256

    a28a2c442b61b60682ea3c200ad3169b7a95338d1cc888eaa4eb855d3119d4a4

    SHA512

    0bc4b286a1fc5b66f2e4455990bf988a0b38295f6fbd269459a6c7259a3b11fee16ee054ab4c5b510e8ae7800189321d20d4261131221cf88cd341c77c5732d6

  • C:\Users\Admin\AppData\Local\Temp\bk_D69E.tmp

    Filesize

    37KB

    MD5

    f1fe537ac62d4855a28aa36600514066

    SHA1

    6ff9e5014bbe388a2113ce046481511198932dda

    SHA256

    a28a2c442b61b60682ea3c200ad3169b7a95338d1cc888eaa4eb855d3119d4a4

    SHA512

    0bc4b286a1fc5b66f2e4455990bf988a0b38295f6fbd269459a6c7259a3b11fee16ee054ab4c5b510e8ae7800189321d20d4261131221cf88cd341c77c5732d6

  • C:\Windows\Help\Other.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\Help\Other.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\Help\Other.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\SVIQ.EXE

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\SVIQ.EXE

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\SVIQ.EXE

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\SysWOW64\WinSit.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\SysWOW64\WinSit.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\SysWOW64\WinSit.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\SysWOW64\config\Win.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\SysWOW64\config\Win.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\SysWOW64\config\Win.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\System\Fun.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\dc.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\dc.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\dc.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\inf\Other.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\inf\Other.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\inf\Other.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\system\Fun.exe

    Filesize

    100KB

    MD5

    466b8767482c92dbd55789a6541083c0

    SHA1

    55f63f9f29028ed97fc5a92398f5b57cc2df3b92

    SHA256

    b41564a5da158ca4a4a692e618617e236f9a622744bbbb263725732ed620f0e2

    SHA512

    1d3d07298523b41d912b5a3fb9ce7965887d4bded74af79491515230f6416800eecad92a176f810f4b070a97aa804d70cd4696e7be874a232cae7e20ec52cf74

  • C:\Windows\wininit.ini

    Filesize

    41B

    MD5

    e839977c0d22c9aa497b0b1d90d8a372

    SHA1

    b5048e501399138796b38f3d3666e1a88c397e83

    SHA256

    478db7f82fd7ef4860f7acd2f534ec303175500d7f4e1e36161d31c900d234e2

    SHA512

    4c8ba5a26b6f738f8d25c32d019cee63e9a32d28e3aeb8fe31b965d7603c24a3539e469c8eb569747b47dadc9c43cdd1066ddb37ed8138bee5d0c74b5d0c275d

  • C:\Windows\wininit.ini

    Filesize

    41B

    MD5

    e839977c0d22c9aa497b0b1d90d8a372

    SHA1

    b5048e501399138796b38f3d3666e1a88c397e83

    SHA256

    478db7f82fd7ef4860f7acd2f534ec303175500d7f4e1e36161d31c900d234e2

    SHA512

    4c8ba5a26b6f738f8d25c32d019cee63e9a32d28e3aeb8fe31b965d7603c24a3539e469c8eb569747b47dadc9c43cdd1066ddb37ed8138bee5d0c74b5d0c275d

  • C:\Windows\wininit.ini

    Filesize

    41B

    MD5

    e839977c0d22c9aa497b0b1d90d8a372

    SHA1

    b5048e501399138796b38f3d3666e1a88c397e83

    SHA256

    478db7f82fd7ef4860f7acd2f534ec303175500d7f4e1e36161d31c900d234e2

    SHA512

    4c8ba5a26b6f738f8d25c32d019cee63e9a32d28e3aeb8fe31b965d7603c24a3539e469c8eb569747b47dadc9c43cdd1066ddb37ed8138bee5d0c74b5d0c275d

  • memory/4032-137-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4032-183-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4156-167-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4156-184-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4384-182-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4544-168-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB