Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    162s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 09:52

General

  • Target

    344792acc9787542a7277330a0ac8ab3343db26ac6ab1643a5c532ddc9eed63d.exe

  • Size

    184KB

  • MD5

    3fd94d502bf7390aa5b01b94edf4bd50

  • SHA1

    8261fffc67ea9055517270a5cb387b40d1ec7522

  • SHA256

    344792acc9787542a7277330a0ac8ab3343db26ac6ab1643a5c532ddc9eed63d

  • SHA512

    56b62dffef3894e9be0007a43afa6f0b1b3cb9017afd14415a8d464d8f0f9939ebb194a0e2bf2588fdff10f59e3225a8c6a4fbe37120ddbb321982d1dfac6cde

  • SSDEEP

    3072:vdOsw7fNLbWBmdo90BPIGdLe1dZ2txz2LmfrIxN:VOpfNLPdoizKUF2LqIx

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\344792acc9787542a7277330a0ac8ab3343db26ac6ab1643a5c532ddc9eed63d.exe
    "C:\Users\Admin\AppData\Local\Temp\344792acc9787542a7277330a0ac8ab3343db26ac6ab1643a5c532ddc9eed63d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\344792acc9787542a7277330a0ac8ab3343db26ac6ab1643a5c532ddc9eed63d.exe
      "C:\Users\Admin\AppData\Local\Temp\344792acc9787542a7277330a0ac8ab3343db26ac6ab1643a5c532ddc9eed63d.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:576
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Windows\SysWOW64\mspaint.exe
          "C:\Windows\system32\mspaint.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:920
      • C:\Users\Admin\AppData\Local\Temp\344792acc9787542a7277330a0ac8ab3343db26ac6ab1643a5c532ddc9eed63d.exe
        "C:\Users\Admin\AppData\Local\Temp\344792acc9787542a7277330a0ac8ab3343db26ac6ab1643a5c532ddc9eed63d.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
          • Adds Run key to start application
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1028
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1296
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1296 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UAKORVQ9.txt

    Filesize

    537B

    MD5

    28fc47c3db0543ea56074a99d1740603

    SHA1

    21a689d5c3ab2e4992831062d33becb901fc5578

    SHA256

    8700c5c2638ed75ae36f36aaa26483faf19ba223ff7a41b26722ab3134d83be6

    SHA512

    10b373b9d6d49b13e79f542aa8f3393bedd2b20b1b7fb2d28a67f3ff43872682c7e64382b9019970a2a457ea97195b76383256f273eefee141383c8748251dc6

  • memory/576-287-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-176-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-58-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/576-59-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/576-55-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/576-62-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/576-61-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/576-66-0x0000000075841000-0x0000000075843000-memory.dmp

    Filesize

    8KB

  • memory/576-67-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/576-112-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-100-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-103-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-107-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-56-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/576-95-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-97-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-120-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-116-0x00000000022F0000-0x000000000233E000-memory.dmp

    Filesize

    312KB

  • memory/576-86-0x00000000002C0000-0x00000000002F9000-memory.dmp

    Filesize

    228KB

  • memory/576-286-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/864-117-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/864-179-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/864-106-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/864-126-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/864-87-0x0000000000100000-0x0000000000121000-memory.dmp

    Filesize

    132KB

  • memory/864-288-0x0000000000100000-0x0000000000121000-memory.dmp

    Filesize

    132KB

  • memory/864-290-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/864-111-0x0000000000360000-0x00000000003AE000-memory.dmp

    Filesize

    312KB

  • memory/920-185-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/920-91-0x0000000000A51000-0x0000000000A53000-memory.dmp

    Filesize

    8KB

  • memory/920-291-0x0000000000500000-0x000000000054E000-memory.dmp

    Filesize

    312KB

  • memory/1652-181-0x0000000000370000-0x00000000003BE000-memory.dmp

    Filesize

    312KB

  • memory/1652-84-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1652-113-0x0000000000370000-0x00000000003BE000-memory.dmp

    Filesize

    312KB

  • memory/1652-80-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1652-121-0x0000000000370000-0x00000000003BE000-memory.dmp

    Filesize

    312KB

  • memory/1652-78-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1652-88-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1652-127-0x0000000000370000-0x00000000003BE000-memory.dmp

    Filesize

    312KB

  • memory/1652-76-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1652-74-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1652-72-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1652-289-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1652-71-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1672-54-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1672-64-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB