Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    223s
  • max time network
    221s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 22:31

General

  • Target

    7b1e838428e1c6b66dc54cb9662fc97c8fabfe751ee31728d9b6d604b91a66c4.exe

  • Size

    460KB

  • MD5

    cd3c9b2d5a0583a12af5fa2db7bd2e02

  • SHA1

    7f09c6eddd4a8e585bba0be0170c195f2b57f9f8

  • SHA256

    7b1e838428e1c6b66dc54cb9662fc97c8fabfe751ee31728d9b6d604b91a66c4

  • SHA512

    9f609708ad30e92e21d1cd4691fb7295f7ee0e4dc4e58af92e7c9a54b6f61b9812477e44cda275445a820983cce5760bfa292439e17352d2408b0bb950e99db2

  • SSDEEP

    12288:ppLCnVtGQ6vRSDB4fkCmHQrBecfKZI+yN:8ofHQaVfKZI9N

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Drops file in Drivers directory 4 IoCs
  • Executes dropped EXE 18 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 11 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b1e838428e1c6b66dc54cb9662fc97c8fabfe751ee31728d9b6d604b91a66c4.exe
    "C:\Users\Admin\AppData\Local\Temp\7b1e838428e1c6b66dc54cb9662fc97c8fabfe751ee31728d9b6d604b91a66c4.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\Local Settings\Application Data\spoolsv.exe
      "C:\Users\Admin\Local Settings\Application Data\spoolsv.exe" /c 31
      2⤵
      • Executes dropped EXE
      PID:2124
    • C:\Windows\SysWOW64\drivers\dllhst3g.exe
      C:\Windows\System32\drivers\dllhst3g.exe /c 54
      2⤵
      • Executes dropped EXE
      PID:1104
    • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe /c 85
      2⤵
      • Executes dropped EXE
      PID:2620
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\mstsc.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\mstsc.exe" /c 14
      2⤵
      • Executes dropped EXE
      PID:1520
    • C:\Windows\SysWOW64\drivers\dllhst3g.exe
      C:\Windows\System32\drivers\dllhst3g.exe /c 55
      2⤵
      • Executes dropped EXE
      PID:3252
    • C:\Users\Admin\AppData\Roaming\MICROS~1\cisvc.exe
      C:\Users\Admin\AppData\Roaming\MICROS~1\cisvc.exe /c 35
      2⤵
      • Executes dropped EXE
      PID:708
    • C:\Users\Admin\AppData\Roaming\Microsoft\ieudinit.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\ieudinit.exe /c 7
      2⤵
      • Executes dropped EXE
      PID:920
    • C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhost.exe
      "C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhost.exe" /c 9
      2⤵
      • Executes dropped EXE
      PID:1304
    • C:\Users\Admin\Local Settings\Application Data\spoolsv.exe
      "C:\Users\Admin\Local Settings\Application Data\spoolsv.exe" /c 11
      2⤵
      • Executes dropped EXE
      PID:3828
    • C:\Users\Admin\Local Settings\Application Data\spoolsv.exe
      "C:\Users\Admin\Local Settings\Application Data\spoolsv.exe" /r
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Users\Admin\Local Settings\Application Data\spoolsv.exe
        "C:\Users\Admin\Local Settings\Application Data\spoolsv.exe" /c 3
        3⤵
        • Executes dropped EXE
        PID:4508
      • C:\Windows\SysWOW64\drivers\dllhst3g.exe
        C:\Windows\System32\drivers\dllhst3g.exe /c 35
        3⤵
        • Executes dropped EXE
        PID:4616
      • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe /c 60
        3⤵
        • Executes dropped EXE
        PID:3328
      • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\mstsc.exe
        "C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\mstsc.exe" /c 5
        3⤵
        • Executes dropped EXE
        PID:3944
      • C:\Windows\SysWOW64\drivers\dllhst3g.exe
        C:\Windows\System32\drivers\dllhst3g.exe /c 95
        3⤵
        • Executes dropped EXE
        PID:2084
      • C:\Users\Admin\AppData\Roaming\MICROS~1\cisvc.exe
        C:\Users\Admin\AppData\Roaming\MICROS~1\cisvc.exe /c 57
        3⤵
        • Executes dropped EXE
        PID:424
      • C:\Users\Admin\AppData\Roaming\Microsoft\ieudinit.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\ieudinit.exe /c 10
        3⤵
        • Executes dropped EXE
        PID:600
      • C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhost.exe
        "C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhost.exe" /c 13
        3⤵
        • Executes dropped EXE
        PID:1420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\mstsc.exe

    Filesize

    460KB

    MD5

    c34abdfa0b3e299acef7dfd4b22285ab

    SHA1

    6559d6b31905caa4d6c70ad08f6090b458b75f3e

    SHA256

    95d5c162b6c0e7df8617fbbd1858d91a8101f6988e7e26ae5b27f428d3ab6623

    SHA512

    8f3f36d7cadfb90ff4835a6da9e135fb6796d42823dcf23e67fc2e417ba90a8b686d4273147d83e9b8fb72c0b08b57d31a97b514aefe088ead2e9156b46786d5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\mstsc.exe

    Filesize

    460KB

    MD5

    c34abdfa0b3e299acef7dfd4b22285ab

    SHA1

    6559d6b31905caa4d6c70ad08f6090b458b75f3e

    SHA256

    95d5c162b6c0e7df8617fbbd1858d91a8101f6988e7e26ae5b27f428d3ab6623

    SHA512

    8f3f36d7cadfb90ff4835a6da9e135fb6796d42823dcf23e67fc2e417ba90a8b686d4273147d83e9b8fb72c0b08b57d31a97b514aefe088ead2e9156b46786d5

  • C:\Users\Admin\AppData\Local\Microsoft\dllhost.exe

    Filesize

    460KB

    MD5

    a7a4dc301e11c2d8f22a48610c7d3bec

    SHA1

    bd69e067d8cd144055b2fd448b8d61c9f8014c54

    SHA256

    8610a1b012bb4c5c46ad541f08808a728eaf3e95945d802a91fca4d741449f74

    SHA512

    954a9d3637d87df82f9c051ebf21d8ab0c00d45d96144cfebc7f4e2af9bda28b358be4565563fb4e7a0a97938421ea87988e3bd7343582c2ea66e9ca5e30a176

  • C:\Users\Admin\AppData\Local\Microsoft\dllhost.exe

    Filesize

    460KB

    MD5

    a7a4dc301e11c2d8f22a48610c7d3bec

    SHA1

    bd69e067d8cd144055b2fd448b8d61c9f8014c54

    SHA256

    8610a1b012bb4c5c46ad541f08808a728eaf3e95945d802a91fca4d741449f74

    SHA512

    954a9d3637d87df82f9c051ebf21d8ab0c00d45d96144cfebc7f4e2af9bda28b358be4565563fb4e7a0a97938421ea87988e3bd7343582c2ea66e9ca5e30a176

  • C:\Users\Admin\AppData\Local\Temp\Twain002.Mtx

    Filesize

    9B

    MD5

    c02b0cde10e9cad32380ed8ac4ed5890

    SHA1

    20590f6db41b109b683ddf37dc7551a15dac5f48

    SHA256

    e6e3f5e51b5185f430efe99dac2ced82a74f231d8a807ad87940f4b002a9f7c9

    SHA512

    d5ca3033a9014936079e783084c3300e294cf2bb309bf69d86c88b0fd82cd6fe6628768f36933d69d04ad66fa4594d93cf61fc56829a55aafadc3c2824c2884b

  • C:\Users\Admin\AppData\Local\spoolsv.exe

    Filesize

    460KB

    MD5

    a932ef2be1b233acacf8cbb1bb0a5434

    SHA1

    7107e14a497971cbfaa520d4db83a2b68e688f95

    SHA256

    fdfbd397e02fdeaadb1a66ecf2f83d018c4d4fcb7ecb88ef0927490bfd52f546

    SHA512

    0ec56efbb83ca61f0208034c105993887566a46e6f036f997bc887b6637eed66b68ace94a28ad14843dcd4ab0885bbd2c6f05a929850149286bbec18d48f2d39

  • C:\Users\Admin\AppData\Local\spoolsv.exe

    Filesize

    460KB

    MD5

    a932ef2be1b233acacf8cbb1bb0a5434

    SHA1

    7107e14a497971cbfaa520d4db83a2b68e688f95

    SHA256

    fdfbd397e02fdeaadb1a66ecf2f83d018c4d4fcb7ecb88ef0927490bfd52f546

    SHA512

    0ec56efbb83ca61f0208034c105993887566a46e6f036f997bc887b6637eed66b68ace94a28ad14843dcd4ab0885bbd2c6f05a929850149286bbec18d48f2d39

  • C:\Users\Admin\AppData\Local\spoolsv.exe

    Filesize

    460KB

    MD5

    a932ef2be1b233acacf8cbb1bb0a5434

    SHA1

    7107e14a497971cbfaa520d4db83a2b68e688f95

    SHA256

    fdfbd397e02fdeaadb1a66ecf2f83d018c4d4fcb7ecb88ef0927490bfd52f546

    SHA512

    0ec56efbb83ca61f0208034c105993887566a46e6f036f997bc887b6637eed66b68ace94a28ad14843dcd4ab0885bbd2c6f05a929850149286bbec18d48f2d39

  • C:\Users\Admin\AppData\Local\spoolsv.exe

    Filesize

    460KB

    MD5

    a932ef2be1b233acacf8cbb1bb0a5434

    SHA1

    7107e14a497971cbfaa520d4db83a2b68e688f95

    SHA256

    fdfbd397e02fdeaadb1a66ecf2f83d018c4d4fcb7ecb88ef0927490bfd52f546

    SHA512

    0ec56efbb83ca61f0208034c105993887566a46e6f036f997bc887b6637eed66b68ace94a28ad14843dcd4ab0885bbd2c6f05a929850149286bbec18d48f2d39

  • C:\Users\Admin\AppData\Roaming\MICROS~1\cisvc.exe

    Filesize

    460KB

    MD5

    996f2e33ee70435b7f7d840908bdab36

    SHA1

    96b5657d1435b13101353bd45b9e7b5f444bcec7

    SHA256

    540e9121cb3bb9fa37f8d7b940407a4be35982dee79b8ab95d3c41dec813897e

    SHA512

    77aab6ad898e4ed7566d3e38a038bea3a4bed1f80280d1c29f22feee12856ea1bc4b2b47f320d97d3174e4206e26f472c19c246fd4dba7a08ae9aaa0b9252602

  • C:\Users\Admin\AppData\Roaming\Microsoft\cisvc.exe

    Filesize

    460KB

    MD5

    996f2e33ee70435b7f7d840908bdab36

    SHA1

    96b5657d1435b13101353bd45b9e7b5f444bcec7

    SHA256

    540e9121cb3bb9fa37f8d7b940407a4be35982dee79b8ab95d3c41dec813897e

    SHA512

    77aab6ad898e4ed7566d3e38a038bea3a4bed1f80280d1c29f22feee12856ea1bc4b2b47f320d97d3174e4206e26f472c19c246fd4dba7a08ae9aaa0b9252602

  • C:\Users\Admin\AppData\Roaming\Microsoft\cisvc.exe

    Filesize

    460KB

    MD5

    996f2e33ee70435b7f7d840908bdab36

    SHA1

    96b5657d1435b13101353bd45b9e7b5f444bcec7

    SHA256

    540e9121cb3bb9fa37f8d7b940407a4be35982dee79b8ab95d3c41dec813897e

    SHA512

    77aab6ad898e4ed7566d3e38a038bea3a4bed1f80280d1c29f22feee12856ea1bc4b2b47f320d97d3174e4206e26f472c19c246fd4dba7a08ae9aaa0b9252602

  • C:\Users\Admin\AppData\Roaming\Microsoft\ieudinit.exe

    Filesize

    460KB

    MD5

    60c5b2c3e491287b5b7b89a4c0e98866

    SHA1

    34a58db99ad7378e10368d4e5d96caba7d471244

    SHA256

    4ae33bdf52274199b59320dc91501e7cf96063a580ea5d9d70a90ae30e997631

    SHA512

    0c8a4c41f8f50ae9a1be464a41157dd1867cde526ecf353b42c093507fdd36d1c4ef25ceae7b24ffefe7eec36732312f405f241d866261c9ede7a8f2029f73ad

  • C:\Users\Admin\AppData\Roaming\Microsoft\ieudinit.exe

    Filesize

    460KB

    MD5

    60c5b2c3e491287b5b7b89a4c0e98866

    SHA1

    34a58db99ad7378e10368d4e5d96caba7d471244

    SHA256

    4ae33bdf52274199b59320dc91501e7cf96063a580ea5d9d70a90ae30e997631

    SHA512

    0c8a4c41f8f50ae9a1be464a41157dd1867cde526ecf353b42c093507fdd36d1c4ef25ceae7b24ffefe7eec36732312f405f241d866261c9ede7a8f2029f73ad

  • C:\Users\Admin\AppData\Roaming\Microsoft\ieudinit.exe

    Filesize

    460KB

    MD5

    60c5b2c3e491287b5b7b89a4c0e98866

    SHA1

    34a58db99ad7378e10368d4e5d96caba7d471244

    SHA256

    4ae33bdf52274199b59320dc91501e7cf96063a580ea5d9d70a90ae30e997631

    SHA512

    0c8a4c41f8f50ae9a1be464a41157dd1867cde526ecf353b42c093507fdd36d1c4ef25ceae7b24ffefe7eec36732312f405f241d866261c9ede7a8f2029f73ad

  • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe

    Filesize

    460KB

    MD5

    2bca096883d21b70b823df63559c2523

    SHA1

    52480ecb56e250bc688bd454762dd6ab590a632a

    SHA256

    19ef50a821b778c52318d4cda35ef329d8dab03f28c52491c065d7389e0e7c90

    SHA512

    d35a4aa6856fdccd02c0add29685ce7bf89cb3991cf311e617c8313ef58158c8337e3eb961100b0b23c860a8e5313cb8fd3cabd035a4c4e71d38c66ce2c88e9d

  • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe

    Filesize

    460KB

    MD5

    2bca096883d21b70b823df63559c2523

    SHA1

    52480ecb56e250bc688bd454762dd6ab590a632a

    SHA256

    19ef50a821b778c52318d4cda35ef329d8dab03f28c52491c065d7389e0e7c90

    SHA512

    d35a4aa6856fdccd02c0add29685ce7bf89cb3991cf311e617c8313ef58158c8337e3eb961100b0b23c860a8e5313cb8fd3cabd035a4c4e71d38c66ce2c88e9d

  • C:\Users\Admin\AppData\Roaming\Microsoft\mstinit.exe

    Filesize

    460KB

    MD5

    2bca096883d21b70b823df63559c2523

    SHA1

    52480ecb56e250bc688bd454762dd6ab590a632a

    SHA256

    19ef50a821b778c52318d4cda35ef329d8dab03f28c52491c065d7389e0e7c90

    SHA512

    d35a4aa6856fdccd02c0add29685ce7bf89cb3991cf311e617c8313ef58158c8337e3eb961100b0b23c860a8e5313cb8fd3cabd035a4c4e71d38c66ce2c88e9d

  • C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\mstsc.exe

    Filesize

    460KB

    MD5

    c34abdfa0b3e299acef7dfd4b22285ab

    SHA1

    6559d6b31905caa4d6c70ad08f6090b458b75f3e

    SHA256

    95d5c162b6c0e7df8617fbbd1858d91a8101f6988e7e26ae5b27f428d3ab6623

    SHA512

    8f3f36d7cadfb90ff4835a6da9e135fb6796d42823dcf23e67fc2e417ba90a8b686d4273147d83e9b8fb72c0b08b57d31a97b514aefe088ead2e9156b46786d5

  • C:\Users\Admin\Local Settings\Application Data\Microsoft\dllhost.exe

    Filesize

    460KB

    MD5

    a7a4dc301e11c2d8f22a48610c7d3bec

    SHA1

    bd69e067d8cd144055b2fd448b8d61c9f8014c54

    SHA256

    8610a1b012bb4c5c46ad541f08808a728eaf3e95945d802a91fca4d741449f74

    SHA512

    954a9d3637d87df82f9c051ebf21d8ab0c00d45d96144cfebc7f4e2af9bda28b358be4565563fb4e7a0a97938421ea87988e3bd7343582c2ea66e9ca5e30a176

  • C:\Users\Admin\Local Settings\Application Data\spoolsv.exe

    Filesize

    460KB

    MD5

    a932ef2be1b233acacf8cbb1bb0a5434

    SHA1

    7107e14a497971cbfaa520d4db83a2b68e688f95

    SHA256

    fdfbd397e02fdeaadb1a66ecf2f83d018c4d4fcb7ecb88ef0927490bfd52f546

    SHA512

    0ec56efbb83ca61f0208034c105993887566a46e6f036f997bc887b6637eed66b68ace94a28ad14843dcd4ab0885bbd2c6f05a929850149286bbec18d48f2d39

  • C:\Windows\SysWOW64\drivers\dllhst3g.exe

    Filesize

    460KB

    MD5

    849a01c8e1f231872317d2a6a8c74c1a

    SHA1

    e5e6c5c11e4e59cd0ae4468ffbb480df12dff510

    SHA256

    9e6a29acffc7a482c278ef54a9a50fd14659177f584854315c2275daabaa0feb

    SHA512

    c80d3d7bda38e591b60d874e23558f7b7592fa24eeee775fbc2a83ee950ad98a6417b1338456252ad9749bb80e72dac5d283348b650780361a5fa1f530b29275

  • C:\Windows\SysWOW64\drivers\dllhst3g.exe

    Filesize

    460KB

    MD5

    849a01c8e1f231872317d2a6a8c74c1a

    SHA1

    e5e6c5c11e4e59cd0ae4468ffbb480df12dff510

    SHA256

    9e6a29acffc7a482c278ef54a9a50fd14659177f584854315c2275daabaa0feb

    SHA512

    c80d3d7bda38e591b60d874e23558f7b7592fa24eeee775fbc2a83ee950ad98a6417b1338456252ad9749bb80e72dac5d283348b650780361a5fa1f530b29275

  • C:\Windows\SysWOW64\drivers\dllhst3g.exe

    Filesize

    460KB

    MD5

    849a01c8e1f231872317d2a6a8c74c1a

    SHA1

    e5e6c5c11e4e59cd0ae4468ffbb480df12dff510

    SHA256

    9e6a29acffc7a482c278ef54a9a50fd14659177f584854315c2275daabaa0feb

    SHA512

    c80d3d7bda38e591b60d874e23558f7b7592fa24eeee775fbc2a83ee950ad98a6417b1338456252ad9749bb80e72dac5d283348b650780361a5fa1f530b29275

  • C:\Windows\SysWOW64\drivers\dllhst3g.exe

    Filesize

    460KB

    MD5

    849a01c8e1f231872317d2a6a8c74c1a

    SHA1

    e5e6c5c11e4e59cd0ae4468ffbb480df12dff510

    SHA256

    9e6a29acffc7a482c278ef54a9a50fd14659177f584854315c2275daabaa0feb

    SHA512

    c80d3d7bda38e591b60d874e23558f7b7592fa24eeee775fbc2a83ee950ad98a6417b1338456252ad9749bb80e72dac5d283348b650780361a5fa1f530b29275

  • C:\Windows\SysWOW64\drivers\dllhst3g.exe

    Filesize

    460KB

    MD5

    849a01c8e1f231872317d2a6a8c74c1a

    SHA1

    e5e6c5c11e4e59cd0ae4468ffbb480df12dff510

    SHA256

    9e6a29acffc7a482c278ef54a9a50fd14659177f584854315c2275daabaa0feb

    SHA512

    c80d3d7bda38e591b60d874e23558f7b7592fa24eeee775fbc2a83ee950ad98a6417b1338456252ad9749bb80e72dac5d283348b650780361a5fa1f530b29275