Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    196s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 16:51

General

  • Target

    65018afc3232d86a1777c748e1443163589bccb3ac5dcbaa1776bba7c9551e73.exe

  • Size

    352KB

  • MD5

    18dc3b43511394d54bdfca7a2cc00a70

  • SHA1

    9061c03e01cbf55927e4a9db18b68e9fbc77246c

  • SHA256

    65018afc3232d86a1777c748e1443163589bccb3ac5dcbaa1776bba7c9551e73

  • SHA512

    0dfceef5ba00b5e1c470639bcd94a6320c6f20622199691e21d266cdff8d65ebd821dd4097e9e935431c2ff0b703c7958516db2ac739fcb1dd52ec92d2ea779c

  • SSDEEP

    3072:Fz/92a98YQ19SeOglRGzus3L0eYYQ19qROLz/9PwCZ632kKVaiJ38yed:FL9IR3Ozqs3JYRXL99E3iaugd

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in Program Files directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65018afc3232d86a1777c748e1443163589bccb3ac5dcbaa1776bba7c9551e73.exe
    "C:\Users\Admin\AppData\Local\Temp\65018afc3232d86a1777c748e1443163589bccb3ac5dcbaa1776bba7c9551e73.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Users\Admin\AppData\Local\Temp\Loader_forqd311.exe
      "C:\Users\Admin\AppData\Local\Temp\Loader_forqd311.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:212
      • C:\Users\Admin\AppData\Local\Temp\PPTV(pplive)_forqd311.exe
        "C:\Users\Admin\AppData\Local\Temp\PPTV(pplive)_forqd311.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2508
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 /s "C:\Program Files (x86)\Internet Explorer\PPLite\plugin\pplugin2.dll"
          4⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:3908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Explorer\PPLite\plugin\pplugin2.dll

    Filesize

    241KB

    MD5

    f62f6814c814b1edd41401c50135bcde

    SHA1

    dbd994d95ca44d9f672149b3780b0ee32df3f404

    SHA256

    6f060604bd162cadd83e75eeb0285056aa389bdacf1a4c906a81e63328ddd650

    SHA512

    a2be347d3f2c6fb0c55bdc22b881450db9e3f1c7fdfcd47245122dcdfe7c77d923d36be6aadfccc4a6e327078e9f2d109d65cc7ddd4436a899dd61328f03cb35

  • C:\Program Files (x86)\Internet Explorer\PPLite\plugin\pplugin2.dll

    Filesize

    241KB

    MD5

    f62f6814c814b1edd41401c50135bcde

    SHA1

    dbd994d95ca44d9f672149b3780b0ee32df3f404

    SHA256

    6f060604bd162cadd83e75eeb0285056aa389bdacf1a4c906a81e63328ddd650

    SHA512

    a2be347d3f2c6fb0c55bdc22b881450db9e3f1c7fdfcd47245122dcdfe7c77d923d36be6aadfccc4a6e327078e9f2d109d65cc7ddd4436a899dd61328f03cb35

  • C:\Users\Admin\AppData\Local\Temp\Loader_forqd311.exe

    Filesize

    65KB

    MD5

    f7a1ed6adcdcd53e9c15afd05d6ba22d

    SHA1

    31203081e03e0f8d76787d73139427036c871d6a

    SHA256

    0b2e5f5607957f2a4bb6506e1c4f4ff0f343ebbd63864f8eee7e8686ad0cdb9f

    SHA512

    28d7b0d65a3a6faeb6cd30abdafdc426097432694f997d680ddb8cb3c631d2d44972999b50e9d643150a02c751b7f1f1097ecf18597b7477708bd703f1dbe962

  • C:\Users\Admin\AppData\Local\Temp\Loader_forqd311.exe

    Filesize

    65KB

    MD5

    f7a1ed6adcdcd53e9c15afd05d6ba22d

    SHA1

    31203081e03e0f8d76787d73139427036c871d6a

    SHA256

    0b2e5f5607957f2a4bb6506e1c4f4ff0f343ebbd63864f8eee7e8686ad0cdb9f

    SHA512

    28d7b0d65a3a6faeb6cd30abdafdc426097432694f997d680ddb8cb3c631d2d44972999b50e9d643150a02c751b7f1f1097ecf18597b7477708bd703f1dbe962

  • C:\Users\Admin\AppData\Local\Temp\PPTV(pplive)_forqd311.exe

    Filesize

    9.6MB

    MD5

    6ee63b876c3bc158f2de7ec7e52e990d

    SHA1

    496c2075eae6c2bdfc4049f09a90469ec58c9125

    SHA256

    70f924ac38b2115267992c998db8725238f3aea32f94c06353bb7bc6d8354d9a

    SHA512

    ee82a780307d552ea8c053bb2866e978f626535d5017423709cf2ccf90b6f1a7954156fb24374beb73435a6d92f7d5599e50d4560157a6ba76706bc694701aad

  • C:\Users\Admin\AppData\Local\Temp\PPTV(pplive)_forqd311.exe

    Filesize

    9.6MB

    MD5

    6ee63b876c3bc158f2de7ec7e52e990d

    SHA1

    496c2075eae6c2bdfc4049f09a90469ec58c9125

    SHA256

    70f924ac38b2115267992c998db8725238f3aea32f94c06353bb7bc6d8354d9a

    SHA512

    ee82a780307d552ea8c053bb2866e978f626535d5017423709cf2ccf90b6f1a7954156fb24374beb73435a6d92f7d5599e50d4560157a6ba76706bc694701aad

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\FindProcDLL.dll

    Filesize

    20KB

    MD5

    943ccc923be093185c04e893245e55c4

    SHA1

    5d48cfcbe7a659e8c1da7127aced2cffb8e6d125

    SHA256

    893607cef43f3dbe210b301c6b91d426a4eca11694d8feb5104edd329365f57d

    SHA512

    5006e7b312a3182b4d638a38579ff1bbbaecf288995d23135d201745b4d2b999357ce8ca051decd51c55620fc144e536d51846f73e42d76c5cd058a00c5661f6

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\FindProcDLL.dll

    Filesize

    20KB

    MD5

    943ccc923be093185c04e893245e55c4

    SHA1

    5d48cfcbe7a659e8c1da7127aced2cffb8e6d125

    SHA256

    893607cef43f3dbe210b301c6b91d426a4eca11694d8feb5104edd329365f57d

    SHA512

    5006e7b312a3182b4d638a38579ff1bbbaecf288995d23135d201745b4d2b999357ce8ca051decd51c55620fc144e536d51846f73e42d76c5cd058a00c5661f6

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\InetLoad.dll

    Filesize

    23KB

    MD5

    7a10bf1243756d9cfbf6a5160d0daa23

    SHA1

    5770bab5f288383e316e2e59b427f7eac1e50347

    SHA256

    64d779b5bac8a2b8a31a83cb3b4171141b4809e3e126a546a4c1f7570ee93210

    SHA512

    3a8d37a47a17893388ad9f58028d98ff0687ecc9fc9f0b0501650544985e3ec257c113381a3910b3b0cc8a06fe4e26fea1b65adfd4768822e6e638a9215841bf

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\InetLoad.dll

    Filesize

    23KB

    MD5

    7a10bf1243756d9cfbf6a5160d0daa23

    SHA1

    5770bab5f288383e316e2e59b427f7eac1e50347

    SHA256

    64d779b5bac8a2b8a31a83cb3b4171141b4809e3e126a546a4c1f7570ee93210

    SHA512

    3a8d37a47a17893388ad9f58028d98ff0687ecc9fc9f0b0501650544985e3ec257c113381a3910b3b0cc8a06fe4e26fea1b65adfd4768822e6e638a9215841bf

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\PPInstallLog.dll

    Filesize

    41KB

    MD5

    a04d44787b28d37b4334c184ea4faae8

    SHA1

    47a5038f2fc45841420a89f08eefd35191aa1fe7

    SHA256

    34f0eb6f3b7deda82929fba6993eb27cd26d0b791be8031ce0b4729a7dc9dd46

    SHA512

    a529e5c412dce90f34e13a185e81b757adf140447167b310d056d2b380873683e5b6681f5810be7d1194cfdd64eda25b87a1a5aae70ed4e48be5aa64acbd5346

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\PPInstallLog.dll

    Filesize

    41KB

    MD5

    a04d44787b28d37b4334c184ea4faae8

    SHA1

    47a5038f2fc45841420a89f08eefd35191aa1fe7

    SHA256

    34f0eb6f3b7deda82929fba6993eb27cd26d0b791be8031ce0b4729a7dc9dd46

    SHA512

    a529e5c412dce90f34e13a185e81b757adf140447167b310d056d2b380873683e5b6681f5810be7d1194cfdd64eda25b87a1a5aae70ed4e48be5aa64acbd5346

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\pnsis.dll

    Filesize

    72KB

    MD5

    dde7cd3719145ecf3c89d2a1e79ca1f3

    SHA1

    92802c38f88c4d57f0b1153b04b4de43af4adcde

    SHA256

    c930819a0f64879fe3a96c606da4be49613693a43b9b1060dc870bec7b3ab47a

    SHA512

    dd67858919fea31f0d4df0c012dc9605fc68bb7512924fee04ae41528d02f8f7ddfd32949841b676735a9d3d81f7dcb455854f20467a4a40ee9f48babd5bee5a

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\pnsis.dll

    Filesize

    72KB

    MD5

    dde7cd3719145ecf3c89d2a1e79ca1f3

    SHA1

    92802c38f88c4d57f0b1153b04b4de43af4adcde

    SHA256

    c930819a0f64879fe3a96c606da4be49613693a43b9b1060dc870bec7b3ab47a

    SHA512

    dd67858919fea31f0d4df0c012dc9605fc68bb7512924fee04ae41528d02f8f7ddfd32949841b676735a9d3d81f7dcb455854f20467a4a40ee9f48babd5bee5a

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\time.dll

    Filesize

    10KB

    MD5

    38977533750fe69979b2c2ac801f96e6

    SHA1

    74643c30cda909e649722ed0c7f267903558e92a

    SHA256

    b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35

    SHA512

    e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53

  • C:\Users\Admin\AppData\Local\Temp\nsnCA81.tmp\time.dll

    Filesize

    10KB

    MD5

    38977533750fe69979b2c2ac801f96e6

    SHA1

    74643c30cda909e649722ed0c7f267903558e92a

    SHA256

    b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35

    SHA512

    e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53

  • memory/2508-148-0x0000000002311000-0x0000000002315000-memory.dmp

    Filesize

    16KB

  • memory/2508-143-0x0000000002171000-0x0000000002173000-memory.dmp

    Filesize

    8KB

  • memory/2508-151-0x0000000002331000-0x0000000002333000-memory.dmp

    Filesize

    8KB

  • memory/2508-157-0x0000000003B90000-0x0000000003BA2000-memory.dmp

    Filesize

    72KB