Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 06:19

General

  • Target

    734e5219aab0531f3309f3269eb906ec8249796fa4622924e498cd06cb610764.exe

  • Size

    405KB

  • MD5

    cee44d3739132e442a86ec658e6c3053

  • SHA1

    d1d38c2485be83f1ff05e5811f6e8f71125a6819

  • SHA256

    734e5219aab0531f3309f3269eb906ec8249796fa4622924e498cd06cb610764

  • SHA512

    30ee4c0ee8853513eb8b6ab2f408c0ca2120580de3ec3ab1857e35a6759551082ed712044260c0c317306dd35347bddf623f4bf0a5b08f9d28ae73a12e9b1983

  • SSDEEP

    6144:NRtX+DEgy3kZN759jMjxdjevX4Ypml4y1mx8L1fUv+iGSS9RTF:HFSE4LjjK9evXC48mxrGiGnfF

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\sppsvc.exe
    C:\Windows\system32\sppsvc.exe
    1⤵
      PID:1032
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Adds Run key to start application
      • Modifies Internet Explorer Protected Mode
      • Modifies Internet Explorer Protected Mode Banner
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\734e5219aab0531f3309f3269eb906ec8249796fa4622924e498cd06cb610764.exe
        "C:\Users\Admin\AppData\Local\Temp\734e5219aab0531f3309f3269eb906ec8249796fa4622924e498cd06cb610764.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:1552
    • C:\Windows\System32\spoolsv.exe
      C:\Windows\System32\spoolsv.exe
      1⤵
        PID:1040

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\KepfIddih\KepfIddih.dat

        Filesize

        265KB

        MD5

        ae6cdbbb0660ce28202631f6e4da4dfc

        SHA1

        e3323820def5e7287c08c7fdef896e89b75fa3d4

        SHA256

        5f1647abd2bb3241852d8658d815229701c9553b5313841e62038d4f31e9db80

        SHA512

        400b9dfec973f723de85c6a491a6bf05fce655cbdc66253321bb9529c9c50cbf39f85e3565808a7976fc20b259f94a6891ccc70a9a8325d85a8c324f0a294531

      • \ProgramData\KepfIddih\KepfIddih.dat

        Filesize

        265KB

        MD5

        ae6cdbbb0660ce28202631f6e4da4dfc

        SHA1

        e3323820def5e7287c08c7fdef896e89b75fa3d4

        SHA256

        5f1647abd2bb3241852d8658d815229701c9553b5313841e62038d4f31e9db80

        SHA512

        400b9dfec973f723de85c6a491a6bf05fce655cbdc66253321bb9529c9c50cbf39f85e3565808a7976fc20b259f94a6891ccc70a9a8325d85a8c324f0a294531

      • memory/1040-61-0x0000000001D60000-0x0000000001DB3000-memory.dmp

        Filesize

        332KB

      • memory/1220-72-0x0000000002C70000-0x0000000002CDB000-memory.dmp

        Filesize

        428KB

      • memory/1220-71-0x0000000002AA0000-0x0000000002AF3000-memory.dmp

        Filesize

        332KB

      • memory/1552-59-0x0000000010000000-0x0000000010032000-memory.dmp

        Filesize

        200KB

      • memory/1552-58-0x0000000000400000-0x00000000004D1000-memory.dmp

        Filesize

        836KB

      • memory/1552-55-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1552-70-0x0000000010000000-0x000000001006A000-memory.dmp

        Filesize

        424KB

      • memory/1552-54-0x0000000075681000-0x0000000075683000-memory.dmp

        Filesize

        8KB

      • memory/1552-73-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1552-74-0x0000000010000000-0x0000000010032000-memory.dmp

        Filesize

        200KB

      • memory/1552-75-0x0000000001E90000-0x0000000001EE3000-memory.dmp

        Filesize

        332KB