Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 04:13

General

  • Target

    d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6.exe

  • Size

    102KB

  • MD5

    32399ab3d976b7cf3c112b78737ef2fd

  • SHA1

    a5cb177e3c27664829ef68424a581792fdd41402

  • SHA256

    d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6

  • SHA512

    fb3b213d9c3906d7e97b54121b1308f1f8892532115e6a265ab57f16fbef665b602a3ccb06fd7f2994204ca5b7d491fc5bc9c1ca663931889f6235a5566ea1ee

  • SSDEEP

    3072:CBG7TNCnkzkmnw60Jzoxc4QLw8ZTgncteHVO81K4:VNCnkvdmzoTQLt9sP1O87

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6.exe
    "C:\Users\Admin\AppData\Local\Temp\d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6.exe
      C:\Users\Admin\AppData\Local\Temp\d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Users\Admin\AppData\Roaming\Xqrlri.exe
        "C:\Users\Admin\AppData\Roaming\Xqrlri.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Users\Admin\AppData\Roaming\Xqrlri.exe
          C:\Users\Admin\AppData\Roaming\Xqrlri.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1864
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:568
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1756
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CY5NRX9Q.txt

    Filesize

    608B

    MD5

    ba926b414f2cb69945da7b8a66af6191

    SHA1

    f7ea6f4b248f4ecdd2a302cd5eda786a2aa64e6e

    SHA256

    800321522efb1cb570e1303fe7ef149b92de4b6ac9bb09f208993f334dea3599

    SHA512

    a2d8ffc78043beec33eb984748b0a6e52800d66fc39ac9b19aae3f9af0bf32cd40802c899cd79bdf618209b26ec370d80d5dd9fa663f6890f1662b0b3a215b6b

  • C:\Users\Admin\AppData\Roaming\Xqrlri.exe

    Filesize

    102KB

    MD5

    32399ab3d976b7cf3c112b78737ef2fd

    SHA1

    a5cb177e3c27664829ef68424a581792fdd41402

    SHA256

    d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6

    SHA512

    fb3b213d9c3906d7e97b54121b1308f1f8892532115e6a265ab57f16fbef665b602a3ccb06fd7f2994204ca5b7d491fc5bc9c1ca663931889f6235a5566ea1ee

  • C:\Users\Admin\AppData\Roaming\Xqrlri.exe

    Filesize

    102KB

    MD5

    32399ab3d976b7cf3c112b78737ef2fd

    SHA1

    a5cb177e3c27664829ef68424a581792fdd41402

    SHA256

    d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6

    SHA512

    fb3b213d9c3906d7e97b54121b1308f1f8892532115e6a265ab57f16fbef665b602a3ccb06fd7f2994204ca5b7d491fc5bc9c1ca663931889f6235a5566ea1ee

  • C:\Users\Admin\AppData\Roaming\Xqrlri.exe

    Filesize

    102KB

    MD5

    32399ab3d976b7cf3c112b78737ef2fd

    SHA1

    a5cb177e3c27664829ef68424a581792fdd41402

    SHA256

    d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6

    SHA512

    fb3b213d9c3906d7e97b54121b1308f1f8892532115e6a265ab57f16fbef665b602a3ccb06fd7f2994204ca5b7d491fc5bc9c1ca663931889f6235a5566ea1ee

  • \Users\Admin\AppData\Roaming\Xqrlri.exe

    Filesize

    102KB

    MD5

    32399ab3d976b7cf3c112b78737ef2fd

    SHA1

    a5cb177e3c27664829ef68424a581792fdd41402

    SHA256

    d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6

    SHA512

    fb3b213d9c3906d7e97b54121b1308f1f8892532115e6a265ab57f16fbef665b602a3ccb06fd7f2994204ca5b7d491fc5bc9c1ca663931889f6235a5566ea1ee

  • \Users\Admin\AppData\Roaming\Xqrlri.exe

    Filesize

    102KB

    MD5

    32399ab3d976b7cf3c112b78737ef2fd

    SHA1

    a5cb177e3c27664829ef68424a581792fdd41402

    SHA256

    d2516c9ec323e79d800142e2167a39abaaf3115bb4a121493e3f89188b2fbbc6

    SHA512

    fb3b213d9c3906d7e97b54121b1308f1f8892532115e6a265ab57f16fbef665b602a3ccb06fd7f2994204ca5b7d491fc5bc9c1ca663931889f6235a5566ea1ee

  • memory/760-67-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/760-72-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1056-59-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

    Filesize

    8KB

  • memory/1056-55-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1056-66-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1056-60-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1056-61-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1200-58-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1200-54-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1864-76-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1864-77-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB