Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    109s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 18:52

General

  • Target

    d1add14944ee25075c685db2ef39cf28fa0ca695c4d336831e7af31f01b57e8a.exe

  • Size

    643KB

  • MD5

    3ae4d65f40833a6ef8b76d10230348c5

  • SHA1

    c0c3802928ebb16b42e7875a10e550b3b15f4382

  • SHA256

    d1add14944ee25075c685db2ef39cf28fa0ca695c4d336831e7af31f01b57e8a

  • SHA512

    830bec1b16b75da31220b6cbd51820221e78e6e11f4c2e9a52a9a114d1a61962e4df32357104ab38d10c400ce7b5d32b8d113c18de9c20bfef2010c85f187542

  • SSDEEP

    12288:miKU0BFtvsPUkGXgDkmBxAJmKVg8zThh6XQ1HoRUAWfTq3N:IVXtyLGwDJkJxVVzXIIHo7WfTq

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1add14944ee25075c685db2ef39cf28fa0ca695c4d336831e7af31f01b57e8a.exe
    "C:\Users\Admin\AppData\Local\Temp\d1add14944ee25075c685db2ef39cf28fa0ca695c4d336831e7af31f01b57e8a.exe"
    1⤵
    • Drops file in Windows directory
    PID:1640
  • C:\Windows\Wtool.exe
    C:\Windows\Wtool.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Windows\System32\ie4uinit.exe
        "C:\Windows\System32\ie4uinit.exe" -ShowQLIcon
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        PID:604
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1180 CREDAT:275457 /prefetch:2
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:268

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Wtool.DLL

    Filesize

    577KB

    MD5

    a568f61f93e49edb965e84c5d6815d32

    SHA1

    191a72977a7bc27c0fe241761a1cfdba9a40d67c

    SHA256

    98ee12a87cca6af453b35623372190fb5f2628e07ea267b4c6f2a4c0ec04bdf3

    SHA512

    81340c74dba845b3278172585e12b7fc39bb2dd32f6737c00428f99b85962d42e6c007cde84c8dfd4128e7590e76b5afdfa78711a6b80836b12c92669225dfbd

  • C:\Windows\Wtool.exe

    Filesize

    643KB

    MD5

    3ae4d65f40833a6ef8b76d10230348c5

    SHA1

    c0c3802928ebb16b42e7875a10e550b3b15f4382

    SHA256

    d1add14944ee25075c685db2ef39cf28fa0ca695c4d336831e7af31f01b57e8a

    SHA512

    830bec1b16b75da31220b6cbd51820221e78e6e11f4c2e9a52a9a114d1a61962e4df32357104ab38d10c400ce7b5d32b8d113c18de9c20bfef2010c85f187542

  • memory/604-56-0x000007FEFB851000-0x000007FEFB853000-memory.dmp

    Filesize

    8KB

  • memory/972-57-0x00000000021F0000-0x0000000002287000-memory.dmp

    Filesize

    604KB

  • memory/972-58-0x00000000757B1000-0x00000000757B3000-memory.dmp

    Filesize

    8KB