Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    247s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 18:43

General

  • Target

    b138c7c0f7c462bd3b78ae7fdd98903f87560aab8bae6ecd4847be2b551c52e2.exe

  • Size

    327KB

  • MD5

    c8b35bda3870044f416dc32c0fd45646

  • SHA1

    c98d330d000e8e2a497f050c6eeceb751c475c0d

  • SHA256

    b138c7c0f7c462bd3b78ae7fdd98903f87560aab8bae6ecd4847be2b551c52e2

  • SHA512

    90603064045e4df00eabd3bc2c5439ed71dfc9f649c1dc4a86803741c265cb334998c2340db9d4cdc658cffb66478ad78f65de4fac17683caded1a75e1e1e66f

  • SSDEEP

    6144:ROrb/7NraKU6SK9EE7RkCVAwDBYsMIrAj+eyJmSbPTOs0c9PQdMb1ljIf7Sny:RoT7NzUPK9EE7hzxAjZyJmSXOs0mPQOW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b138c7c0f7c462bd3b78ae7fdd98903f87560aab8bae6ecd4847be2b551c52e2.exe
    "C:\Users\Admin\AppData\Local\Temp\b138c7c0f7c462bd3b78ae7fdd98903f87560aab8bae6ecd4847be2b551c52e2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:576
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:1208

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • memory/576-70-0x0000000000C70000-0x0000000000E58000-memory.dmp

      Filesize

      1.9MB

    • memory/576-67-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB

    • memory/576-68-0x0000000000C70000-0x0000000000E58000-memory.dmp

      Filesize

      1.9MB

    • memory/576-66-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB

    • memory/772-69-0x0000000002510000-0x00000000026F8000-memory.dmp

      Filesize

      1.9MB

    • memory/772-58-0x00000000008D0000-0x00000000009D2000-memory.dmp

      Filesize

      1.0MB

    • memory/772-59-0x0000000002510000-0x00000000026F8000-memory.dmp

      Filesize

      1.9MB

    • memory/772-54-0x00000000761F1000-0x00000000761F3000-memory.dmp

      Filesize

      8KB

    • memory/772-56-0x0000000001000000-0x0000000001102000-memory.dmp

      Filesize

      1.0MB

    • memory/772-55-0x0000000001000000-0x0000000001102000-memory.dmp

      Filesize

      1.0MB

    • memory/772-75-0x0000000001000000-0x0000000001102000-memory.dmp

      Filesize

      1.0MB

    • memory/1936-73-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB

    • memory/1936-76-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB

    • memory/1936-77-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB