Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 00:49

General

  • Target

    97e6d3159aaf33a7d7d8c8541b1adadf1f04b9cf492584b31d0b67a9dfd32056.exe

  • Size

    120KB

  • MD5

    f67add38f08d559a49dd002228b58e01

  • SHA1

    ab77fb1945192dfd58aa271dcd90df406ac467cf

  • SHA256

    97e6d3159aaf33a7d7d8c8541b1adadf1f04b9cf492584b31d0b67a9dfd32056

  • SHA512

    f1e6cca4493ecf53e21e65060d80539ee0d32566376f1fc37740994160a6f5bc5a960e3d794cffc0d6bdaf96f592d7f98c31606ca7a75f5c8c68cbe4947d05af

  • SSDEEP

    1536:rk3eKNkTSdCS1isFqn+kVDX2FrsqtjEieir6rqAXiN3xOJ8yWkpCg8snE38i38uU:w3eVT89qzGFrftLorvXiHu8sE938ulnW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
    1⤵
      PID:2664
    • C:\Users\Admin\AppData\Local\Temp\97e6d3159aaf33a7d7d8c8541b1adadf1f04b9cf492584b31d0b67a9dfd32056.exe
      "C:\Users\Admin\AppData\Local\Temp\97e6d3159aaf33a7d7d8c8541b1adadf1f04b9cf492584b31d0b67a9dfd32056.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Users\Admin\AppData\Local\Temp\97e6d3159aaf33a7d7d8c8541b1adadf1f04b9cf492584b31d0b67a9dfd32056.exe
        "C:\Users\Admin\AppData\Local\Temp\97e6d3159aaf33a7d7d8c8541b1adadf1f04b9cf492584b31d0b67a9dfd32056.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Users\Admin\AppData\Roaming\service939.exe
          -n
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:488
          • C:\Users\Admin\AppData\Roaming\service939.exe
            -n
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Modifies WinLogon
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4476
    • C:\Windows\servicing\TrustedInstaller.exe
      C:\Windows\servicing\TrustedInstaller.exe
      1⤵
        PID:2304

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\service939.exe

        Filesize

        120KB

        MD5

        f67add38f08d559a49dd002228b58e01

        SHA1

        ab77fb1945192dfd58aa271dcd90df406ac467cf

        SHA256

        97e6d3159aaf33a7d7d8c8541b1adadf1f04b9cf492584b31d0b67a9dfd32056

        SHA512

        f1e6cca4493ecf53e21e65060d80539ee0d32566376f1fc37740994160a6f5bc5a960e3d794cffc0d6bdaf96f592d7f98c31606ca7a75f5c8c68cbe4947d05af

      • C:\Users\Admin\AppData\Roaming\service939.exe

        Filesize

        120KB

        MD5

        f67add38f08d559a49dd002228b58e01

        SHA1

        ab77fb1945192dfd58aa271dcd90df406ac467cf

        SHA256

        97e6d3159aaf33a7d7d8c8541b1adadf1f04b9cf492584b31d0b67a9dfd32056

        SHA512

        f1e6cca4493ecf53e21e65060d80539ee0d32566376f1fc37740994160a6f5bc5a960e3d794cffc0d6bdaf96f592d7f98c31606ca7a75f5c8c68cbe4947d05af

      • C:\Users\Admin\AppData\Roaming\service939.exe

        Filesize

        120KB

        MD5

        f67add38f08d559a49dd002228b58e01

        SHA1

        ab77fb1945192dfd58aa271dcd90df406ac467cf

        SHA256

        97e6d3159aaf33a7d7d8c8541b1adadf1f04b9cf492584b31d0b67a9dfd32056

        SHA512

        f1e6cca4493ecf53e21e65060d80539ee0d32566376f1fc37740994160a6f5bc5a960e3d794cffc0d6bdaf96f592d7f98c31606ca7a75f5c8c68cbe4947d05af

      • memory/488-146-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/628-134-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/628-137-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/628-140-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB

      • memory/920-136-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/920-132-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/4476-148-0x0000000000400000-0x000000000041A000-memory.dmp

        Filesize

        104KB