Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    345s
  • max time network
    435s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 00:09

General

  • Target

    e4cf2cb5adba7561d7203bac0a88dd10a7ecd931693247c772dffb7cff36adcc.exe

  • Size

    240KB

  • MD5

    028e3bf939a0534b6c11f74f67164c98

  • SHA1

    b98aa9f25cddf114252dd353ae56bb58db30cb9a

  • SHA256

    e4cf2cb5adba7561d7203bac0a88dd10a7ecd931693247c772dffb7cff36adcc

  • SHA512

    c1dae1c04a5d5661a4eb14496a5a44d71dd6a7f4190c8ee792fa0d4a291bfd68187afd9a50b2773a28520c1371647413075a2f35a1ca2508b7fcbf27736f1a92

  • SSDEEP

    6144:7PeyxTM94W+HBuA2hNE8x7KLm6NNZkDwWfPMoRjTpzP:7PbZMRtKYwW/TpP

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4cf2cb5adba7561d7203bac0a88dd10a7ecd931693247c772dffb7cff36adcc.exe
    "C:\Users\Admin\AppData\Local\Temp\e4cf2cb5adba7561d7203bac0a88dd10a7ecd931693247c772dffb7cff36adcc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Documents and Settings\tazebama.dl_
      "C:\Documents and Settings\tazebama.dl_"
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      PID:3548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 736
        3⤵
        • Program crash
        PID:2668
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3548 -ip 3548
    1⤵
      PID:4500

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Documents and Settings\tazebama.dl_

      Filesize

      151KB

      MD5

      0b3665bb7e8f3f573d07f19042614bd2

      SHA1

      b360a696d2a3c0f28d510a3056aba2c3f2347aa2

      SHA256

      cb60609d667f512e596ceaa083a83915b54763de168a5b3fc7996ddb88dfa4d4

      SHA512

      a35460faeb45988dcff18fe5609051f27d11c1304dcd845d137768589180fb6ac80c847e101d3508f485e939b1fb7c549daf9a4b777ec2ddb8c97c8336c092d1

    • C:\Users\tazebama.dl_

      Filesize

      151KB

      MD5

      0b3665bb7e8f3f573d07f19042614bd2

      SHA1

      b360a696d2a3c0f28d510a3056aba2c3f2347aa2

      SHA256

      cb60609d667f512e596ceaa083a83915b54763de168a5b3fc7996ddb88dfa4d4

      SHA512

      a35460faeb45988dcff18fe5609051f27d11c1304dcd845d137768589180fb6ac80c847e101d3508f485e939b1fb7c549daf9a4b777ec2ddb8c97c8336c092d1

    • C:\Users\tazebama.dll

      Filesize

      32KB

      MD5

      b6a03576e595afacb37ada2f1d5a0529

      SHA1

      d598d4d0e70dec2ffa2849edaeb4db94fedcc0b8

      SHA256

      1707eaf60aa91f3791aa5643bfa038e9d8141878d61f5d701ebac51f4ae7aaad

      SHA512

      181b7cc6479352fe2c53c3630d45a839cdeb74708be6709c2a75847a54de3ffc1fdac8450270dde7174ecb23e5cb002f8ce39032429a3112b1202f3381b8918c

    • memory/908-133-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/908-134-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/908-138-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/3548-139-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB