Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 18:43

General

  • Target

    b138c7c0f7c462bd3b78ae7fdd98903f87560aab8bae6ecd4847be2b551c52e2.exe

  • Size

    327KB

  • MD5

    c8b35bda3870044f416dc32c0fd45646

  • SHA1

    c98d330d000e8e2a497f050c6eeceb751c475c0d

  • SHA256

    b138c7c0f7c462bd3b78ae7fdd98903f87560aab8bae6ecd4847be2b551c52e2

  • SHA512

    90603064045e4df00eabd3bc2c5439ed71dfc9f649c1dc4a86803741c265cb334998c2340db9d4cdc658cffb66478ad78f65de4fac17683caded1a75e1e1e66f

  • SSDEEP

    6144:ROrb/7NraKU6SK9EE7RkCVAwDBYsMIrAj+eyJmSbPTOs0c9PQdMb1ljIf7Sny:RoT7NzUPK9EE7hzxAjZyJmSXOs0mPQOW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b138c7c0f7c462bd3b78ae7fdd98903f87560aab8bae6ecd4847be2b551c52e2.exe
    "C:\Users\Admin\AppData\Local\Temp\b138c7c0f7c462bd3b78ae7fdd98903f87560aab8bae6ecd4847be2b551c52e2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:260
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:3604

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DSA.EXE

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      290KB

      MD5

      fb5d9233faca3ceaec5cd99ea9dc27ed

      SHA1

      ec10a970b246c88e2b5f1371bdc4829feb9f5e4d

      SHA256

      7dcb83d6d422e8eb550a7c6933b74bbf1f00b79f5fd09e45d281f17383822ebe

      SHA512

      bf2834def89f1a6b83a4f3b5a45c9651915f17b7ceddecf8abbe9a6c6d0c41eb143282c3b36b6bb222e4fce79697931d333cf5ab6f00cbe142677f2bfbed4bb6

    • memory/260-138-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB

    • memory/260-139-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB

    • memory/1456-132-0x0000000001000000-0x0000000001102000-memory.dmp

      Filesize

      1.0MB

    • memory/1456-134-0x0000000001000000-0x0000000001102000-memory.dmp

      Filesize

      1.0MB

    • memory/1456-133-0x0000000001000000-0x0000000001102000-memory.dmp

      Filesize

      1.0MB

    • memory/1456-144-0x0000000001000000-0x0000000001102000-memory.dmp

      Filesize

      1.0MB

    • memory/4924-142-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB

    • memory/4924-143-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB

    • memory/4924-145-0x0000000000400000-0x00000000005E8000-memory.dmp

      Filesize

      1.9MB