Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    188s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 15:41

General

  • Target

    aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe

  • Size

    171KB

  • MD5

    3f2ecc1e1dad23071f38cd08fb7c6d9c

  • SHA1

    c62331533faf93ebc441ddb1b0731697fbdf8bd4

  • SHA256

    aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84

  • SHA512

    3ee4a4d81476e753e6f8b722ec24ac22d7a248e335861bf83a299e47ab003ba73c62a95ce8c8d1bcc09526721a2866b5ca5d00612f00e7962cd84c6df8c122d8

  • SSDEEP

    3072:YK91ur/c9FB2LJRdBgocrOSiFAbx6XnoeAhgJkRdwsEKJohRRiK6:b91uTcMLHdOoeHGndAh0sEKJSRRit

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe
    "C:\Users\Admin\AppData\Local\Temp\aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe
      "C:\Users\Admin\AppData\Local\Temp\aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\g4fweq23.Bi\40842F3893C.exe
        "C:\g4fweq23.Bi\40842F3893C.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1860
        • C:\g4fweq23.Bi\40842F3893C.exe
          "C:\g4fweq23.Bi\40842F3893C.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1220
          • C:\Users\Admin\AppData\Local\Temp\UMa38E2.exe
            "C:\Users\Admin\AppData\Local\Temp\UMa38E2.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Modifies Internet Explorer Phishing Filter
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\UMa38E2.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • C:\Users\Admin\AppData\Local\Temp\UMa38E2.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • C:\g4fweq23.Bi\40842F3893C.exe

    Filesize

    171KB

    MD5

    3f2ecc1e1dad23071f38cd08fb7c6d9c

    SHA1

    c62331533faf93ebc441ddb1b0731697fbdf8bd4

    SHA256

    aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84

    SHA512

    3ee4a4d81476e753e6f8b722ec24ac22d7a248e335861bf83a299e47ab003ba73c62a95ce8c8d1bcc09526721a2866b5ca5d00612f00e7962cd84c6df8c122d8

  • C:\g4fweq23.Bi\40842F3893C.exe

    Filesize

    171KB

    MD5

    3f2ecc1e1dad23071f38cd08fb7c6d9c

    SHA1

    c62331533faf93ebc441ddb1b0731697fbdf8bd4

    SHA256

    aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84

    SHA512

    3ee4a4d81476e753e6f8b722ec24ac22d7a248e335861bf83a299e47ab003ba73c62a95ce8c8d1bcc09526721a2866b5ca5d00612f00e7962cd84c6df8c122d8

  • C:\g4fweq23.Bi\40842F3893C.exe

    Filesize

    171KB

    MD5

    3f2ecc1e1dad23071f38cd08fb7c6d9c

    SHA1

    c62331533faf93ebc441ddb1b0731697fbdf8bd4

    SHA256

    aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84

    SHA512

    3ee4a4d81476e753e6f8b722ec24ac22d7a248e335861bf83a299e47ab003ba73c62a95ce8c8d1bcc09526721a2866b5ca5d00612f00e7962cd84c6df8c122d8

  • C:\g4fweq23.Bi\9F599E372A1BAAC

    Filesize

    13KB

    MD5

    1658a9dd3ba8a8f002c56b3b8a544fd4

    SHA1

    9d4c844c6d27fe674e59dd511b1eb38ac2695087

    SHA256

    c83936ac73ca4d8f504a03e25a9c13275d54ca659b81952763f094c162839293

    SHA512

    d3aa33059309a271b130a7b447cad7f62ff418ec5bb631c760189a7f2f4a254510f3b8e13d167e411e9d978051e9fe238e92c3f32ba6608ec2a79de09485b892

  • memory/1220-160-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1220-158-0x0000000000443000-0x0000000000460C00-memory.dmp

    Filesize

    119KB

  • memory/1220-165-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/1220-167-0x0000000000790000-0x00000000007DE000-memory.dmp

    Filesize

    312KB

  • memory/1860-155-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1956-208-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/1956-218-0x000000000BB06000-0x000000000BB08000-memory.dmp

    Filesize

    8KB

  • memory/1956-237-0x0000000075150000-0x00000000755A0000-memory.dmp

    Filesize

    4.3MB

  • memory/1956-236-0x000000000BB18000-0x000000000BB1A000-memory.dmp

    Filesize

    8KB

  • memory/1956-235-0x0000000000790000-0x00000000007DE000-memory.dmp

    Filesize

    312KB

  • memory/1956-234-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-161-0x0000000000790000-0x00000000007DE000-memory.dmp

    Filesize

    312KB

  • memory/1956-233-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/1956-232-0x000000000BB03000-0x000000000BB05000-memory.dmp

    Filesize

    8KB

  • memory/1956-231-0x000000000BB18000-0x000000000BB1A000-memory.dmp

    Filesize

    8KB

  • memory/1956-230-0x00000000760F0000-0x0000000076153000-memory.dmp

    Filesize

    396KB

  • memory/1956-227-0x0000000075150000-0x00000000755A0000-memory.dmp

    Filesize

    4.3MB

  • memory/1956-171-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-170-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-173-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-172-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-225-0x000000000BB05000-0x000000000BB07000-memory.dmp

    Filesize

    8KB

  • memory/1956-219-0x000000000BB04000-0x000000000BB06000-memory.dmp

    Filesize

    8KB

  • memory/1956-176-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-178-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-217-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/1956-200-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-180-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-182-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-203-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/1956-187-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-204-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-211-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/1956-214-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/1956-216-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/1956-184-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-215-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-212-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-190-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-209-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-192-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-194-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-196-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/1956-206-0x0000000000790000-0x00000000007DE000-memory.dmp

    Filesize

    312KB

  • memory/1956-201-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/1956-198-0x0000000000750000-0x0000000000756000-memory.dmp

    Filesize

    24KB

  • memory/1956-199-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-144-0x0000000000443000-0x0000000000460C00-memory.dmp

    Filesize

    119KB

  • memory/4168-175-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-205-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-195-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-207-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-193-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-210-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-183-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-181-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-220-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/4168-191-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-213-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-189-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-143-0x0000000000443000-0x0000000000460C00-memory.dmp

    Filesize

    119KB

  • memory/4168-188-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-186-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-177-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-179-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-197-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-202-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-185-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-221-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-223-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/4168-222-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4168-224-0x000000000BB06000-0x000000000BB08000-memory.dmp

    Filesize

    8KB

  • memory/4168-226-0x000000000BB05000-0x000000000BB07000-memory.dmp

    Filesize

    8KB

  • memory/4168-174-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/4168-228-0x0000000075150000-0x00000000755A0000-memory.dmp

    Filesize

    4.3MB

  • memory/4168-136-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4168-229-0x00000000760F0000-0x0000000076153000-memory.dmp

    Filesize

    396KB

  • memory/4168-138-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4168-140-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4168-141-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/4168-142-0x0000000000443000-0x0000000000460C00-memory.dmp

    Filesize

    119KB

  • memory/4168-159-0x0000000077780000-0x0000000077923000-memory.dmp

    Filesize

    1.6MB

  • memory/4668-139-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/4668-132-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB