Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 08:06

General

  • Target

    ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe

  • Size

    168KB

  • MD5

    1a3accafb3d975d55a6844be4bbfa634

  • SHA1

    c406d6f0a52a7876bced084da5e6b11c0addaef7

  • SHA256

    ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3

  • SHA512

    313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920

  • SSDEEP

    3072:ByMI7V0SizShu3ARD9ikLhj0wQ7HXy79g3pD/Y3dmhQPS1GqSl:te0Sizuu3ARD9VLJTgC79QzqC9Sl

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe
    "C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3300
    • C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe
      C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe
        "C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Users\Admin\AppData\Roaming\Kirrrb.exe
          "C:\Users\Admin\AppData\Roaming\Kirrrb.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Users\Admin\AppData\Roaming\Kirrrb.exe
            C:\Users\Admin\AppData\Roaming\Kirrrb.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2536
            • C:\Users\Admin\AppData\Roaming\Kirrrb.exe
              "C:\Users\Admin\AppData\Roaming\Kirrrb.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:476
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4936
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1096
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:17410 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:2896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    a62e66dbd157955d60808bf89987bcde

    SHA1

    a97e8478902ac7db7fd904300304944a41afee8e

    SHA256

    d34e72ae586b00a60e3526f1e75677dcffa83fd33860a771ae592e7d8320cf25

    SHA512

    2c969c621bd5881acf47e85b3a2977b1c43dfa80887f0ab447327162d143795ff647b8ed1aec174a868c0faf1e09eb8baa6a67ea42764b65fe4416d2168e81fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    434B

    MD5

    cbb9d848e4ef1cab5a2e52bb00cf4c47

    SHA1

    0d08cd29106a973ae3e08fb6a08b0d5d8b6056e8

    SHA256

    828174618a207d6005b978ca3a78e62be458023da86ee5a2be9f898011a53d7b

    SHA512

    c25ab6899be3d6e8881cd81444a392c2f9508aefd348f9d08f5b2a66eca46cd578d3882aad7e65e8ff1932be6fbb156bc2d871af4939d1c3b90ef2250a0fbd11

  • C:\Users\Admin\AppData\Roaming\Kirrrb.exe

    Filesize

    168KB

    MD5

    1a3accafb3d975d55a6844be4bbfa634

    SHA1

    c406d6f0a52a7876bced084da5e6b11c0addaef7

    SHA256

    ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3

    SHA512

    313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920

  • C:\Users\Admin\AppData\Roaming\Kirrrb.exe

    Filesize

    168KB

    MD5

    1a3accafb3d975d55a6844be4bbfa634

    SHA1

    c406d6f0a52a7876bced084da5e6b11c0addaef7

    SHA256

    ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3

    SHA512

    313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920

  • C:\Users\Admin\AppData\Roaming\Kirrrb.exe

    Filesize

    168KB

    MD5

    1a3accafb3d975d55a6844be4bbfa634

    SHA1

    c406d6f0a52a7876bced084da5e6b11c0addaef7

    SHA256

    ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3

    SHA512

    313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920

  • C:\Users\Admin\AppData\Roaming\Kirrrb.exe

    Filesize

    168KB

    MD5

    1a3accafb3d975d55a6844be4bbfa634

    SHA1

    c406d6f0a52a7876bced084da5e6b11c0addaef7

    SHA256

    ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3

    SHA512

    313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920

  • memory/476-164-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/476-163-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1512-144-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1512-143-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1512-161-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1512-139-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1548-148-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/1548-155-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2536-159-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3036-140-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3036-136-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/3300-132-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/3300-142-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB