Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    110s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 12:43

General

  • Target

    cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe

  • Size

    784KB

  • MD5

    37f9ac0e96468f74805962394b517848

  • SHA1

    65a0a6e164c93ac9a9fbb37468f517a8a5b3bfd2

  • SHA256

    cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1

  • SHA512

    8996d8c5eb85fbaefc9af493fd394c276bd39ee8ef1068ebd0afef5a2d6ed4f51329b490925f1baecad9023ab847c4d9df0e97b27f49543bdd134eaaecc83dd1

  • SSDEEP

    24576:tzYXFB85pZxx9+WPAcsrYdeCEIOzI4+j4el6/IRBe6:yVB85prts+eCEIapY4el6/A

Score
9/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 6 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe
    "C:\Users\Admin\AppData\Local\Temp\cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\upx.exe
      "C:\Windows\upx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Windows\SysWOW64\svchost.exe¤þ.exe
        C:\Windows\system32\svchost.exe¤þ.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:664
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1948
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\delus.bat
        3⤵
          PID:796

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\E_4\Exmlrpc.fne

      Filesize

      34KB

      MD5

      387cf1d2f17aff6967f3107773764513

      SHA1

      b971bcd44988bee744f8133acb032e07d9dcd1db

      SHA256

      74c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6

      SHA512

      19a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c

    • C:\Users\Admin\AppData\Local\Temp\E_4\dp1.fne

      Filesize

      56KB

      MD5

      6649262561fba5d19f8b99dd251b5d02

      SHA1

      286e2ab6bc2220b3c9a83720c4c612623210e10f

      SHA256

      824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771

      SHA512

      688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef

    • C:\Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

      Filesize

      406KB

      MD5

      e79169d47394020f7c893abb840b61bb

      SHA1

      c5b9c2cbef3d5458b52ebb67461e84432673fb1b

      SHA256

      11c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc

      SHA512

      21ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\M7P362XN.txt

      Filesize

      607B

      MD5

      b3add68c5445a07958eba6867fced743

      SHA1

      4fdea32129ca709fd8e64e9246b1bad74f50fb9c

      SHA256

      5daa700e2db335c9f332f1128a14a004c75517d0a5601c74c8a6bfa28751b4eb

      SHA512

      0e23dd38f87c3cf89cfaa59a569344869993f2ad9b4fcac8d9558b4c133f3c2b94ae91da8ccfa537ebcbee18fdabcff4fcdb1cca610574153bcdd569fd31d7a2

    • C:\Windows\SysWOW64\svchost.exe¤þ.exe

      Filesize

      600KB

      MD5

      0958d11749015e3ad51f4039a7da6433

      SHA1

      28e74cf511b30c64ea46dddee0a0ed9d3c0a29bf

      SHA256

      8e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97

      SHA512

      9ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67

    • C:\Windows\SysWOW64\svchost.exe¤þ.exe

      Filesize

      600KB

      MD5

      0958d11749015e3ad51f4039a7da6433

      SHA1

      28e74cf511b30c64ea46dddee0a0ed9d3c0a29bf

      SHA256

      8e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97

      SHA512

      9ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67

    • C:\Windows\upx.exe

      Filesize

      600KB

      MD5

      0958d11749015e3ad51f4039a7da6433

      SHA1

      28e74cf511b30c64ea46dddee0a0ed9d3c0a29bf

      SHA256

      8e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97

      SHA512

      9ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67

    • C:\Windows\upx.exe

      Filesize

      600KB

      MD5

      0958d11749015e3ad51f4039a7da6433

      SHA1

      28e74cf511b30c64ea46dddee0a0ed9d3c0a29bf

      SHA256

      8e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97

      SHA512

      9ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67

    • \??\c:\delus.bat

      Filesize

      98B

      MD5

      bb62f4a2ac894b3f45c155c08df01d25

      SHA1

      d0f06cafa401a217fae0f65f85df4b4af05a5bbf

      SHA256

      5a3a35d103d4d32a00fb9c1f0646b25a8ce1e997bd693985a8065446d1080fd3

      SHA512

      2426afe80ce56e88d7b4df811d98b3aa0cc946d25970a484cc12b92a6bd2f121bbe3092a427d4f7935ccc6519a709fde0a7aa745086940170ebde9b63e6fb99c

    • \Users\Admin\AppData\Local\Temp\E_4\dp1.fne

      Filesize

      56KB

      MD5

      6649262561fba5d19f8b99dd251b5d02

      SHA1

      286e2ab6bc2220b3c9a83720c4c612623210e10f

      SHA256

      824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771

      SHA512

      688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef

    • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

      Filesize

      406KB

      MD5

      e79169d47394020f7c893abb840b61bb

      SHA1

      c5b9c2cbef3d5458b52ebb67461e84432673fb1b

      SHA256

      11c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc

      SHA512

      21ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a

    • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

      Filesize

      406KB

      MD5

      e79169d47394020f7c893abb840b61bb

      SHA1

      c5b9c2cbef3d5458b52ebb67461e84432673fb1b

      SHA256

      11c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc

      SHA512

      21ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a

    • \Windows\SysWOW64\svchost.exe¤þ.exe

      Filesize

      600KB

      MD5

      0958d11749015e3ad51f4039a7da6433

      SHA1

      28e74cf511b30c64ea46dddee0a0ed9d3c0a29bf

      SHA256

      8e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97

      SHA512

      9ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67

    • \Windows\SysWOW64\svchost.exe¤þ.exe

      Filesize

      600KB

      MD5

      0958d11749015e3ad51f4039a7da6433

      SHA1

      28e74cf511b30c64ea46dddee0a0ed9d3c0a29bf

      SHA256

      8e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97

      SHA512

      9ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67

    • memory/972-71-0x0000000010000000-0x000000001012A000-memory.dmp

      Filesize

      1.2MB

    • memory/972-72-0x0000000000230000-0x0000000000271000-memory.dmp

      Filesize

      260KB

    • memory/972-74-0x0000000000230000-0x0000000000271000-memory.dmp

      Filesize

      260KB

    • memory/972-73-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/972-79-0x0000000010000000-0x000000001012A000-memory.dmp

      Filesize

      1.2MB

    • memory/1356-75-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1356-76-0x0000000010000000-0x000000001012A000-memory.dmp

      Filesize

      1.2MB

    • memory/1356-77-0x00000000002D0000-0x00000000002F4000-memory.dmp

      Filesize

      144KB

    • memory/1356-81-0x0000000010000000-0x000000001012A000-memory.dmp

      Filesize

      1.2MB

    • memory/1356-82-0x0000000010000000-0x000000001012A000-memory.dmp

      Filesize

      1.2MB

    • memory/1640-54-0x00000000757B1000-0x00000000757B3000-memory.dmp

      Filesize

      8KB