Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    167s
  • max time network
    222s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 05:36

General

  • Target

    b5476ccbfe4347afa745481b7577b056e34891c01760fc6d378f696f4e87e11f.exe

  • Size

    163KB

  • MD5

    32a678bbd6eedab3232e50a3378e0391

  • SHA1

    2dda667fb3de88dad5ab2609dcf55ea1504726d2

  • SHA256

    b5476ccbfe4347afa745481b7577b056e34891c01760fc6d378f696f4e87e11f

  • SHA512

    0a52904d696283aead58fa0c66286a2acae7765b7072438f592bb3b6eabb106570cc36379fde6ecdbe8118f25afdab764fbc35897f2b056d1a748d78d8d70296

  • SSDEEP

    3072:3m4azbjjC9C+q+bAgFwIpOLKOAwWxWK7xYOOQbHoPl8qBYQVl7Bp:3mp+q+bAgFwt/5+WiYOOQbIiqCQV

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 18 IoCs
  • Modifies security service 2 TTPs 22 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Unexpected DNS network traffic destination 11 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 22 IoCs
  • NTFS ADS 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5476ccbfe4347afa745481b7577b056e34891c01760fc6d378f696f4e87e11f.exe
    "C:\Users\Admin\AppData\Local\Temp\b5476ccbfe4347afa745481b7577b056e34891c01760fc6d378f696f4e87e11f.exe"
    1⤵
    • Modifies security service
    • Sets service image path in registry
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe"
      2⤵
      • Deletes itself
      PID:784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Google\Desktop\Install\{f6ae883d-87b2-8e92-33b2-e7745dda3830}\ \...\‮ﯹ๛\{f6ae883d-87b2-8e92-33b2-e7745dda3830}\@

    Filesize

    2KB

    MD5

    2f1dba12ee42f91b884c485b01f3a6a4

    SHA1

    96cd2e7e299f3c430884535cafb1e7d715c77c49

    SHA256

    faebf1e6356d9db5be4d81dcb6cd0d3b723f0f9ba3136469eace396cf88b8286

    SHA512

    21c1969a513bf09bb2476e1449e2bd8243602b8cd32f054c82accf876bd41a1cd6d4383f03e41824d9ac8298f59caf0814d71aeb8f42ea40a2f2c4e3a29b3ea1

  • memory/464-58-0x00000000001F0000-0x00000000001FC000-memory.dmp

    Filesize

    48KB

  • memory/560-54-0x0000000074DA1000-0x0000000074DA3000-memory.dmp

    Filesize

    8KB

  • memory/560-55-0x0000000000290000-0x00000000002AA000-memory.dmp

    Filesize

    104KB

  • memory/560-56-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/560-59-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/560-61-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1284-57-0x0000000002A70000-0x0000000002A7C000-memory.dmp

    Filesize

    48KB