Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    175s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2023, 01:42

General

  • Target

    4d9bf71edf2fb4b9b85cdee88eff0cf5b109fe559354d4c33bf2083f873790bd.exe

  • Size

    521KB

  • MD5

    a93fe8ddf2804386a3cf6c9e112c647a

  • SHA1

    805030d0e0497eb17dd73dd87bbbf4a6b430c342

  • SHA256

    4d9bf71edf2fb4b9b85cdee88eff0cf5b109fe559354d4c33bf2083f873790bd

  • SHA512

    b14f7d2c6a7fb0eec28b17202e2a85a68eb417ef681cc224e2aaff0e3b5b171a12b28fee3d0c8a9faff2ff9d7830c4ec9fdc935f8c78736b782d9f6ebe1e777c

  • SSDEEP

    12288:EMr/y90OnXo1RiP2K4x3a2T6ygg1ghr8:Lyh4Of4x3aRZg1M8

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d9bf71edf2fb4b9b85cdee88eff0cf5b109fe559354d4c33bf2083f873790bd.exe
    "C:\Users\Admin\AppData\Local\Temp\4d9bf71edf2fb4b9b85cdee88eff0cf5b109fe559354d4c33bf2083f873790bd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bFj06.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bFj06.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aWW44.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aWW44.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 1080
          4⤵
          • Program crash
          PID:216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nUk36.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nUk36.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3664
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1244 -ip 1244
    1⤵
      PID:3052

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bFj06.exe

      Filesize

      334KB

      MD5

      0f0dc185ca895b45b462ff5e2b4bc5d8

      SHA1

      f7f3aeb05534ad98009686e98ce725e85dfe57ac

      SHA256

      a751ec6229ac3ee999117c7cbd540cc5cfae009b31f79b80a6c032e9b2d6b50e

      SHA512

      fa5039d4260add1965cebf87dabd29a114925fccc5258a988fa8078c89ae54203d0aed647306367d4cbe081471fddc251bb77c3c2b03ffff5490d5b7baead9e4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bFj06.exe

      Filesize

      334KB

      MD5

      0f0dc185ca895b45b462ff5e2b4bc5d8

      SHA1

      f7f3aeb05534ad98009686e98ce725e85dfe57ac

      SHA256

      a751ec6229ac3ee999117c7cbd540cc5cfae009b31f79b80a6c032e9b2d6b50e

      SHA512

      fa5039d4260add1965cebf87dabd29a114925fccc5258a988fa8078c89ae54203d0aed647306367d4cbe081471fddc251bb77c3c2b03ffff5490d5b7baead9e4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aWW44.exe

      Filesize

      237KB

      MD5

      1d8a1be595df510b69f5cae9bfbf5ee0

      SHA1

      3e3880552270e2644df5d38fc94060ebe3edd70e

      SHA256

      2996df1925e043f663f70786e774a007697ae24e73781fc8cfbf86e77bc17a10

      SHA512

      ae181cdf4feab7b8ba8adf6de92f9e1ab876fd407749005931a2b3cb61b1e7c822ad3d18a5f71bf54af2e70cb157d5cc4262d7b083965da694d1a4d66b1ca433

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aWW44.exe

      Filesize

      237KB

      MD5

      1d8a1be595df510b69f5cae9bfbf5ee0

      SHA1

      3e3880552270e2644df5d38fc94060ebe3edd70e

      SHA256

      2996df1925e043f663f70786e774a007697ae24e73781fc8cfbf86e77bc17a10

      SHA512

      ae181cdf4feab7b8ba8adf6de92f9e1ab876fd407749005931a2b3cb61b1e7c822ad3d18a5f71bf54af2e70cb157d5cc4262d7b083965da694d1a4d66b1ca433

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nUk36.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nUk36.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • memory/1244-140-0x0000000000400000-0x000000000056B000-memory.dmp

      Filesize

      1.4MB

    • memory/1244-139-0x0000000000570000-0x000000000059D000-memory.dmp

      Filesize

      180KB

    • memory/1244-141-0x0000000004CF0000-0x0000000005294000-memory.dmp

      Filesize

      5.6MB

    • memory/1244-142-0x0000000000674000-0x0000000000694000-memory.dmp

      Filesize

      128KB

    • memory/1244-143-0x0000000000674000-0x0000000000694000-memory.dmp

      Filesize

      128KB

    • memory/1244-144-0x0000000000400000-0x000000000056B000-memory.dmp

      Filesize

      1.4MB

    • memory/1244-138-0x0000000000674000-0x0000000000694000-memory.dmp

      Filesize

      128KB

    • memory/3664-148-0x0000000000900000-0x000000000090A000-memory.dmp

      Filesize

      40KB

    • memory/3664-149-0x00007FF953A10000-0x00007FF9544D1000-memory.dmp

      Filesize

      10.8MB