Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 09:35

General

  • Target

    a5885afbcac1bb6f36ab672df0e399008d012d53e677f404b3abbde6b0c41839.exe

  • Size

    92KB

  • MD5

    63449fad78f9e9e13ee519f9b37e591a

  • SHA1

    f11b49f95ef9714d322b4f912c82e7ed5d18c338

  • SHA256

    a5885afbcac1bb6f36ab672df0e399008d012d53e677f404b3abbde6b0c41839

  • SHA512

    e1e0b88ce7116e8becf3d44ea3d3194af582791cfdfba66823b840700cc2bdb4f653713897a3ad13fa30f25d233414219ec119ed49e4ca13c8b5416511479a36

  • SSDEEP

    1536:GT76uMyhLtB3eW7soSYT0hPvbVG/ocUhQoF/WVvVSfU5EhJB:GTqyhnjT0pYQ3QPTo

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
    1⤵
      PID:2524
    • C:\Users\Admin\AppData\Local\Temp\a5885afbcac1bb6f36ab672df0e399008d012d53e677f404b3abbde6b0c41839.exe
      "C:\Users\Admin\AppData\Local\Temp\a5885afbcac1bb6f36ab672df0e399008d012d53e677f404b3abbde6b0c41839.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Admin\AppData\Local\Temp\a5885afbcac1bb6f36ab672df0e399008d012d53e677f404b3abbde6b0c41839.exe
        "C:\Users\Admin\AppData\Local\Temp\a5885afbcac1bb6f36ab672df0e399008d012d53e677f404b3abbde6b0c41839.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Users\Admin\AppData\Roaming\service141.exe
          -n
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4676
          • C:\Users\Admin\AppData\Roaming\service141.exe
            -n
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Modifies WinLogon
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4996

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\service141.exe

      Filesize

      92KB

      MD5

      63449fad78f9e9e13ee519f9b37e591a

      SHA1

      f11b49f95ef9714d322b4f912c82e7ed5d18c338

      SHA256

      a5885afbcac1bb6f36ab672df0e399008d012d53e677f404b3abbde6b0c41839

      SHA512

      e1e0b88ce7116e8becf3d44ea3d3194af582791cfdfba66823b840700cc2bdb4f653713897a3ad13fa30f25d233414219ec119ed49e4ca13c8b5416511479a36

    • C:\Users\Admin\AppData\Roaming\service141.exe

      Filesize

      92KB

      MD5

      63449fad78f9e9e13ee519f9b37e591a

      SHA1

      f11b49f95ef9714d322b4f912c82e7ed5d18c338

      SHA256

      a5885afbcac1bb6f36ab672df0e399008d012d53e677f404b3abbde6b0c41839

      SHA512

      e1e0b88ce7116e8becf3d44ea3d3194af582791cfdfba66823b840700cc2bdb4f653713897a3ad13fa30f25d233414219ec119ed49e4ca13c8b5416511479a36

    • C:\Users\Admin\AppData\Roaming\service141.exe

      Filesize

      92KB

      MD5

      63449fad78f9e9e13ee519f9b37e591a

      SHA1

      f11b49f95ef9714d322b4f912c82e7ed5d18c338

      SHA256

      a5885afbcac1bb6f36ab672df0e399008d012d53e677f404b3abbde6b0c41839

      SHA512

      e1e0b88ce7116e8becf3d44ea3d3194af582791cfdfba66823b840700cc2bdb4f653713897a3ad13fa30f25d233414219ec119ed49e4ca13c8b5416511479a36

    • memory/2304-135-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2304-132-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/4248-134-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/4248-141-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/4248-137-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/4676-145-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/4996-148-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB