Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 12:10

General

  • Target

    ef0b0aedc0cf0e39e5c1ac3c905127649bbce354e445825af80fdc207c5c1b42.exe

  • Size

    90KB

  • MD5

    4a88ae4b043e5e626c39a51d7e380b5a

  • SHA1

    a833330f04fa886dc9e401766e7a1673f2a740f6

  • SHA256

    ef0b0aedc0cf0e39e5c1ac3c905127649bbce354e445825af80fdc207c5c1b42

  • SHA512

    83b12a847cd4f639b13db4f7f6ce13965a4757415e698c9ea470680adf5de672479cc9c8927b8a18be012002adc18083b0894226c803626e23025dcc844ac9f9

  • SSDEEP

    1536:VmZWGE/gxwXe4U7bPPa/q4udgeApY06+5wHNxd9m1pLyg+eu+ixh8NJVnKu9ypLI:UZW8wPU/PPWCvmYXhhe2si/8pnfyf2qE

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef0b0aedc0cf0e39e5c1ac3c905127649bbce354e445825af80fdc207c5c1b42.exe
    "C:\Users\Admin\AppData\Local\Temp\ef0b0aedc0cf0e39e5c1ac3c905127649bbce354e445825af80fdc207c5c1b42.exe"
    1⤵
    • Sets file execution options in registry
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Windows\SysWOW64\net.exe
      net stop "Security Center"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5024
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
          PID:1352
      • C:\Windows\SysWOW64\net.exe
        net stop "Windows Firewall/Internet Connection Sharing (ICS)"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
          3⤵
            PID:3136
        • C:\Windows\SysWOW64\net.exe
          net stop System Restore Service
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1588
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop System Restore Service
            3⤵
              PID:1220
          • C:\Users\Admin\AppData\Local\Temp\wmnet.exe
            C:\Users\Admin\AppData\Local\Temp\wmnet.exe
            2⤵
            • Executes dropped EXE
            PID:5060
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c del C:\wmiprvse.exe
            2⤵
              PID:4360

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\wmnet.exe

            Filesize

            34KB

            MD5

            3d9abc0931ba2fe5e0ece6f31336e4c5

            SHA1

            5ed3751d91a899ac1a1606941c7001135d7adde5

            SHA256

            5f1b9bacb3801decc2287473efac54cb85e438cf50024c55189b30974a29c89e

            SHA512

            885857b18e7f51014887254553dea8a5760a87f2551ef8ae204b9e2ec0a14a4fafc875f286d23428e8492b4a398df12def927eaa1aff9e7440ccdf8df6b38c35

          • memory/5028-135-0x0000000010000000-0x000000001003C000-memory.dmp

            Filesize

            240KB

          • memory/5028-138-0x0000000010000000-0x000000001003C000-memory.dmp

            Filesize

            240KB

          • memory/5028-146-0x0000000010000000-0x000000001003C000-memory.dmp

            Filesize

            240KB