Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    82s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7-20220812-es
  • resource tags

    arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    29/12/2022, 13:25

General

  • Target

    setup_1.0.5.1360.exe

  • Size

    2.7MB

  • MD5

    c49799b39f9d1b23eead1de5f0cb3e68

  • SHA1

    89f7472d739c3e7b0329ff0bff6fdb6bec6a147d

  • SHA256

    36c32f7087f36a4666ec1ad90ccda265fedc2951663eb35829ac7a50371274ac

  • SHA512

    b3afe66254e8d3bc34e2de0d7989231a6ae00d83e2019ebfaa32b7ee6e679ceaac791d5baecd1880f00c2674c527ea03bd79cddeae8fd1d57f3a1a41853dcccc

  • SSDEEP

    49152:srv57iY7MK34hRDeSMylD6igxbjcNfAG5lIR52JEMl5nyNSVQ8HHde8KNYw:WB7f7MK34hRDUylD6Bxbjs33ImiqyQVN

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 47 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_1.0.5.1360.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_1.0.5.1360.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\{ccca3470-8784-11ed-9243-66c13449fa90}\setup_1.0.5.1360.exe
      "C:\Users\Admin\AppData\Local\Temp\{ccca3470-8784-11ed-9243-66c13449fa90}\setup_1.0.5.1360.exe" /-nodrop /-"install=C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks for any installed AV software in registry
      • Checks whether UAC is enabled
      • Writes to the Master Boot Record (MBR)
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:108
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://click.kaspersky.com/?hl=es&version=1.0.5.12254&pid=SAFEKIDSWin&syst=Microsoft Windows 7 x64 Edition Service Pack 1 (build 7601)&link=unsupportedOsPatch
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1872
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1872 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1300
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x468
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{ccca3470-8784-11ed-9243-66c13449fa90}\setup_1.0.5.1360.exe

    Filesize

    2.7MB

    MD5

    c49799b39f9d1b23eead1de5f0cb3e68

    SHA1

    89f7472d739c3e7b0329ff0bff6fdb6bec6a147d

    SHA256

    36c32f7087f36a4666ec1ad90ccda265fedc2951663eb35829ac7a50371274ac

    SHA512

    b3afe66254e8d3bc34e2de0d7989231a6ae00d83e2019ebfaa32b7ee6e679ceaac791d5baecd1880f00c2674c527ea03bd79cddeae8fd1d57f3a1a41853dcccc

  • C:\Users\Admin\AppData\Local\Temp\{ccca3470-8784-11ed-9243-66c13449fa90}\setup_1.0.5.1360.exe

    Filesize

    2.7MB

    MD5

    c49799b39f9d1b23eead1de5f0cb3e68

    SHA1

    89f7472d739c3e7b0329ff0bff6fdb6bec6a147d

    SHA256

    36c32f7087f36a4666ec1ad90ccda265fedc2951663eb35829ac7a50371274ac

    SHA512

    b3afe66254e8d3bc34e2de0d7989231a6ae00d83e2019ebfaa32b7ee6e679ceaac791d5baecd1880f00c2674c527ea03bd79cddeae8fd1d57f3a1a41853dcccc

  • \Users\Admin\AppData\Local\Temp\{ccca3470-8784-11ed-9243-66c13449fa90}\setup_1.0.5.1360.exe

    Filesize

    2.7MB

    MD5

    c49799b39f9d1b23eead1de5f0cb3e68

    SHA1

    89f7472d739c3e7b0329ff0bff6fdb6bec6a147d

    SHA256

    36c32f7087f36a4666ec1ad90ccda265fedc2951663eb35829ac7a50371274ac

    SHA512

    b3afe66254e8d3bc34e2de0d7989231a6ae00d83e2019ebfaa32b7ee6e679ceaac791d5baecd1880f00c2674c527ea03bd79cddeae8fd1d57f3a1a41853dcccc

  • \Users\Admin\AppData\Local\Temp\{ccf9cff0-8784-11ed-9243-66c13449fa90}\SETUP.DLL

    Filesize

    7.3MB

    MD5

    9b6a7579bb7424d33b979935f2cfd5e1

    SHA1

    87e01b1bacb79cac20de84d6b78b965c35989db8

    SHA256

    da5ace80de0fff24881b085bd9076ecb7763283bc367dd256cb64db6b0c39446

    SHA512

    7f45e79adff0b4471b7cc922362190b55103a3e7784ceb02d19365a0c11687854ea03e3e56d204dcc087ee985d755b40b12bba74e49b628712af5b4c39d872f1

  • memory/108-58-0x0000000076201000-0x0000000076203000-memory.dmp

    Filesize

    8KB