Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 00:33

General

  • Target

    14ca781f429f7d84132256ab68c70c28a4d3be86c8ac4d901f9a4ebc303ee93f.exe

  • Size

    3.2MB

  • MD5

    9da4d34c63790562fcf7258515d05c45

  • SHA1

    70825648789314017e7557bb14eb84ccdf10a379

  • SHA256

    14ca781f429f7d84132256ab68c70c28a4d3be86c8ac4d901f9a4ebc303ee93f

  • SHA512

    bbcfe8453c9df563a0cd46a8ee5a699d838e29e3788359845730a0ac7a648b24ef8c38313cb829fd999c10832494177933a8a97fa81a3bcec5f0423c5dc13857

  • SSDEEP

    98304:K1DofoRV6Jt/rDMUNAv7kTfuX48HPcC2P6Cd6cpxujdf:K1EfoKkXv7No6cpMj

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 4 IoCs

    Detects file using ACProtect software.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 8 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14ca781f429f7d84132256ab68c70c28a4d3be86c8ac4d901f9a4ebc303ee93f.exe
    "C:\Users\Admin\AppData\Local\Temp\14ca781f429f7d84132256ab68c70c28a4d3be86c8ac4d901f9a4ebc303ee93f.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s C:\Users\Admin\AppData\Local\Temp\tools\COMDLG32.OCX
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:956
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s C:\Users\Admin\AppData\Local\Temp\tools\MSCOMCTL.OCX
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:1712
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s C:\Users\Admin\AppData\Local\Temp\tools\RICHTX32.OCX
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:876
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s C:\Users\Admin\AppData\Local\Temp\tools\MYEDITOR.OCX
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tools\COMDLG32.OCX

    Filesize

    149KB

    MD5

    ab412429f1e5fb9708a8cdea07479099

    SHA1

    eb49323be4384a0e7e36053f186b305636e82887

    SHA256

    e32d8bbe8e6985726742b496520fa47827f3b428648fa1bc34ecffdd9bdac240

    SHA512

    f3348dbc3b05d14482250d7c399c00533598973f8e9168b4082ee5cbb81089dfaefcfda5a6a3c9f05b4445d655051b7a5170c57ee32d7a783dc35a75fee41aa9

  • C:\Users\Admin\AppData\Local\Temp\tools\MSCOMCTL.OCX

    Filesize

    1.0MB

    MD5

    d268668751ee22997d7ef1417034cb04

    SHA1

    d8a87438ab0df47fe252b06162a986399cafffe1

    SHA256

    fac6736251d3c61ecbd63be0420d1c75d5cd0442181d479013330155ca37d358

    SHA512

    75f40cc8c92e3fcdd381669f6aa0bf1e76ee6fec0c5cbf53ea0bbfbff199ac7229fc1405f737420badd24f438b49b8d2eed2bb0f3fad0bf8a974f54bd6964a34

  • C:\Users\Admin\AppData\Local\Temp\tools\MYEDITOR.OCX

    Filesize

    357KB

    MD5

    bcf2dee897b7c803edcc047c57ed0f47

    SHA1

    d7d59159cb0fc52ea081a063c6442e117db31a0d

    SHA256

    484b5c43ed301edd61a738089e500a48203858a42478a3a610ad0009c9899384

    SHA512

    f1d4bb36ed468fdd65afea692f43852f3aac00774c5fa114036458f2c5cee3362df785943ff852f652ec368d713b995bb5193852549634da1892d366a5b61c28

  • C:\Users\Admin\AppData\Local\Temp\tools\RICHTX32.OCX

    Filesize

    207KB

    MD5

    045a16822822426c305ea7280270a3d6

    SHA1

    43075b6696bb2d2f298f263971d4d3e48aa4f561

    SHA256

    318cc48cbcfaba9592956e4298886823cc5f37626c770d6dadbcd224849680c5

    SHA512

    5a042ff0a05421fb01e0a95a8b62f3ce81f90330daed78f09c7d5d2abcb822a2fe99d00494c3ddd96226287fae51367e264b48b2831a8c080916ce18c0a675fa

  • \Users\Admin\AppData\Local\Temp\tools\COMDLG32.OCX

    Filesize

    149KB

    MD5

    ab412429f1e5fb9708a8cdea07479099

    SHA1

    eb49323be4384a0e7e36053f186b305636e82887

    SHA256

    e32d8bbe8e6985726742b496520fa47827f3b428648fa1bc34ecffdd9bdac240

    SHA512

    f3348dbc3b05d14482250d7c399c00533598973f8e9168b4082ee5cbb81089dfaefcfda5a6a3c9f05b4445d655051b7a5170c57ee32d7a783dc35a75fee41aa9

  • \Users\Admin\AppData\Local\Temp\tools\COMDLG32.OCX

    Filesize

    149KB

    MD5

    ab412429f1e5fb9708a8cdea07479099

    SHA1

    eb49323be4384a0e7e36053f186b305636e82887

    SHA256

    e32d8bbe8e6985726742b496520fa47827f3b428648fa1bc34ecffdd9bdac240

    SHA512

    f3348dbc3b05d14482250d7c399c00533598973f8e9168b4082ee5cbb81089dfaefcfda5a6a3c9f05b4445d655051b7a5170c57ee32d7a783dc35a75fee41aa9

  • \Users\Admin\AppData\Local\Temp\tools\MSCOMCTL.OCX

    Filesize

    1.0MB

    MD5

    d268668751ee22997d7ef1417034cb04

    SHA1

    d8a87438ab0df47fe252b06162a986399cafffe1

    SHA256

    fac6736251d3c61ecbd63be0420d1c75d5cd0442181d479013330155ca37d358

    SHA512

    75f40cc8c92e3fcdd381669f6aa0bf1e76ee6fec0c5cbf53ea0bbfbff199ac7229fc1405f737420badd24f438b49b8d2eed2bb0f3fad0bf8a974f54bd6964a34

  • \Users\Admin\AppData\Local\Temp\tools\MYEDITOR.OCX

    Filesize

    357KB

    MD5

    bcf2dee897b7c803edcc047c57ed0f47

    SHA1

    d7d59159cb0fc52ea081a063c6442e117db31a0d

    SHA256

    484b5c43ed301edd61a738089e500a48203858a42478a3a610ad0009c9899384

    SHA512

    f1d4bb36ed468fdd65afea692f43852f3aac00774c5fa114036458f2c5cee3362df785943ff852f652ec368d713b995bb5193852549634da1892d366a5b61c28

  • \Users\Admin\AppData\Local\Temp\tools\MYEDITOR.OCX

    Filesize

    357KB

    MD5

    bcf2dee897b7c803edcc047c57ed0f47

    SHA1

    d7d59159cb0fc52ea081a063c6442e117db31a0d

    SHA256

    484b5c43ed301edd61a738089e500a48203858a42478a3a610ad0009c9899384

    SHA512

    f1d4bb36ed468fdd65afea692f43852f3aac00774c5fa114036458f2c5cee3362df785943ff852f652ec368d713b995bb5193852549634da1892d366a5b61c28

  • \Users\Admin\AppData\Local\Temp\tools\RICHTX32.OCX

    Filesize

    207KB

    MD5

    045a16822822426c305ea7280270a3d6

    SHA1

    43075b6696bb2d2f298f263971d4d3e48aa4f561

    SHA256

    318cc48cbcfaba9592956e4298886823cc5f37626c770d6dadbcd224849680c5

    SHA512

    5a042ff0a05421fb01e0a95a8b62f3ce81f90330daed78f09c7d5d2abcb822a2fe99d00494c3ddd96226287fae51367e264b48b2831a8c080916ce18c0a675fa

  • \Users\Admin\AppData\Local\Temp\tools\RICHTX32.OCX

    Filesize

    207KB

    MD5

    045a16822822426c305ea7280270a3d6

    SHA1

    43075b6696bb2d2f298f263971d4d3e48aa4f561

    SHA256

    318cc48cbcfaba9592956e4298886823cc5f37626c770d6dadbcd224849680c5

    SHA512

    5a042ff0a05421fb01e0a95a8b62f3ce81f90330daed78f09c7d5d2abcb822a2fe99d00494c3ddd96226287fae51367e264b48b2831a8c080916ce18c0a675fa

  • \Users\Admin\AppData\Local\Temp\tools\skinh_vb6.dll

    Filesize

    136KB

    MD5

    cdec482c5149f0cce5546ef506ea033b

    SHA1

    4ed383e7c9b648d90a9b73b8e690774fd6a7c0c1

    SHA256

    0089d7ec375ad3852fddb306ff14bd2c195ad667c5f1553a4e19258546c16671

    SHA512

    eee60bbd1070d33114685d279287b31b8e9d9fd88cdeed0e9eaa153383d4221b2796f32bf9ea33c2ee1d57534801c72f4c887ef927352344ab5b25e24e734846

  • memory/956-59-0x0000000075661000-0x0000000075663000-memory.dmp

    Filesize

    8KB

  • memory/1652-57-0x0000000000400000-0x0000000000BB2000-memory.dmp

    Filesize

    7.7MB

  • memory/1652-56-0x0000000000400000-0x0000000000BB2000-memory.dmp

    Filesize

    7.7MB

  • memory/1652-75-0x0000000010000000-0x00000000100CA000-memory.dmp

    Filesize

    808KB

  • memory/1652-81-0x0000000008500000-0x0000000008636000-memory.dmp

    Filesize

    1.2MB