Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2023, 11:20

General

  • Target

    Archive.710279869.vbs

  • Size

    18KB

  • MD5

    e46c2a754c636b4c95c23760d72d2688

  • SHA1

    efd544914bcd66eecad3ec8c657f496ebc6b0c02

  • SHA256

    e2657715d8d2731cc784a82d87eee39115a66e0dd0a4a6093b24ee35c37ef170

  • SHA512

    5b069b4eeebbc52580afc51799cd3a86ddb3d747475b3fae56ec692d4d86ce896d2ed6a6961e8becec2e4711c97dd33223c3c0529f67fe9a5cad2b3b56b564ea

  • SSDEEP

    192:53JExmMuIYYz8YDyJZ3Z2yxekdfQY2fGV4:bEzuIYYz8YDeZp2yxekdXV4

Malware Config

Signatures

  • Detects Grandoreiro payload 4 IoCs
  • Grandoreiro

    Part of a group of banking trojans, targeting Spanish and Portuguese speaking countries.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Archive.710279869.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\techmaster4\FindSpace.exe
      "C:\techmaster4\FindSpace.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\TECHMA~1\Test.Zip

    Filesize

    16.8MB

    MD5

    1aed29b0be5a4cb6baf8340ee6b54cb4

    SHA1

    8892456e9224ea78fc522a25b8aa41b0e8a7c379

    SHA256

    5c98dd24b48b981b5c2dec205e7d112ddabb3aa301c0ce6541c6ce98c76dffba

    SHA512

    78ea3bd858045201c4b4a36592e35fb1839b050985c69ffb8ac213492094c87e382dcec56be5703494f40806b61be4fc130f647614cc36051c8ab3b5e8cea697

  • C:\techmaster4\FindSpace.exe

    Filesize

    2.2MB

    MD5

    b5485d229f8078575d639fb903b4fca7

    SHA1

    6a67a6bb694df592819d398a645504b2c7a2221c

    SHA256

    9625e775e955281732270b7a0fc468bef83b468be85e82e0659973aefa369782

    SHA512

    5d54f343b986d33c3e7de1450d8b6386bac66a9aeb8a77b0a81652cf2592e8f85847185d6e09e8c486a224bf21eb195308be1f489bbac615bf99d5fc760d85f8

  • C:\techmaster4\FindSpace.exe

    Filesize

    2.2MB

    MD5

    b5485d229f8078575d639fb903b4fca7

    SHA1

    6a67a6bb694df592819d398a645504b2c7a2221c

    SHA256

    9625e775e955281732270b7a0fc468bef83b468be85e82e0659973aefa369782

    SHA512

    5d54f343b986d33c3e7de1450d8b6386bac66a9aeb8a77b0a81652cf2592e8f85847185d6e09e8c486a224bf21eb195308be1f489bbac615bf99d5fc760d85f8

  • C:\techmaster4\FindSpace.exe

    Filesize

    2.2MB

    MD5

    b5485d229f8078575d639fb903b4fca7

    SHA1

    6a67a6bb694df592819d398a645504b2c7a2221c

    SHA256

    9625e775e955281732270b7a0fc468bef83b468be85e82e0659973aefa369782

    SHA512

    5d54f343b986d33c3e7de1450d8b6386bac66a9aeb8a77b0a81652cf2592e8f85847185d6e09e8c486a224bf21eb195308be1f489bbac615bf99d5fc760d85f8

  • C:\techmaster4\dbghelp.dll

    Filesize

    1.2MB

    MD5

    4003e34416ebd25e4c115d49dc15e1a7

    SHA1

    faf95ec65cde5bd833ce610bb8523363310ec4ad

    SHA256

    c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f

    SHA512

    88f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84

  • C:\techmaster4\uires.dll

    Filesize

    13.0MB

    MD5

    87c7411e05ff159a3707869adc9d5c01

    SHA1

    d147cfdc5d2ea979aa757423a0a22577c45acbe1

    SHA256

    207d66dae08ca39065019355802604768b213ed2817e78bea128f136784af6a7

    SHA512

    a5a22ed12fa2ea7d343fa38e527fab8735924e350dd138b72e2bec4417825b8bab52e6814ced320f67030fa3a0b88afd7a50ac1714476f40d9ec54c33acae922

  • C:\techmaster4\zlibai.dll

    Filesize

    16.7MB

    MD5

    cdb42cfc978a5e3d820c5c55a9bfa1ef

    SHA1

    2ca8a78a6ebaf0e1d620f18c45a00ee6de055e8d

    SHA256

    fedead294278a94610da46067f2729dae14cf69d8903a806caa8a1542d454bff

    SHA512

    7488162352556196a6f3ba5bc719fec8fbfbe30b68a68f5d80b38eb03a9158b415a74442b79e9107abc93b8497ceab3e170b46c03dbc6ce7506abea21b260f2a

  • \techmaster4\dbghelp.dll

    Filesize

    1.2MB

    MD5

    4003e34416ebd25e4c115d49dc15e1a7

    SHA1

    faf95ec65cde5bd833ce610bb8523363310ec4ad

    SHA256

    c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f

    SHA512

    88f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84

  • \techmaster4\uires.dll

    Filesize

    13.0MB

    MD5

    87c7411e05ff159a3707869adc9d5c01

    SHA1

    d147cfdc5d2ea979aa757423a0a22577c45acbe1

    SHA256

    207d66dae08ca39065019355802604768b213ed2817e78bea128f136784af6a7

    SHA512

    a5a22ed12fa2ea7d343fa38e527fab8735924e350dd138b72e2bec4417825b8bab52e6814ced320f67030fa3a0b88afd7a50ac1714476f40d9ec54c33acae922

  • \techmaster4\zlibai.dll

    Filesize

    16.7MB

    MD5

    cdb42cfc978a5e3d820c5c55a9bfa1ef

    SHA1

    2ca8a78a6ebaf0e1d620f18c45a00ee6de055e8d

    SHA256

    fedead294278a94610da46067f2729dae14cf69d8903a806caa8a1542d454bff

    SHA512

    7488162352556196a6f3ba5bc719fec8fbfbe30b68a68f5d80b38eb03a9158b415a74442b79e9107abc93b8497ceab3e170b46c03dbc6ce7506abea21b260f2a

  • memory/1556-106-0x00000000036F0000-0x00000000036F1000-memory.dmp

    Filesize

    4KB

  • memory/1988-133-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/1988-141-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/1988-128-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1988-129-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1988-130-0x0000000000130000-0x0000000000131000-memory.dmp

    Filesize

    4KB

  • memory/1988-126-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/1988-132-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/1988-135-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/1988-136-0x0000000000150000-0x0000000000151000-memory.dmp

    Filesize

    4KB

  • memory/1988-138-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/1988-139-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/1988-127-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/1988-142-0x0000000000170000-0x0000000000171000-memory.dmp

    Filesize

    4KB

  • memory/1988-143-0x00000000010D0000-0x000000000219C000-memory.dmp

    Filesize

    16.8MB

  • memory/1988-144-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/1988-125-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/1988-120-0x00000000010D0000-0x000000000219C000-memory.dmp

    Filesize

    16.8MB

  • memory/1988-149-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/1988-150-0x0000000000A40000-0x0000000000A41000-memory.dmp

    Filesize

    4KB

  • memory/1988-151-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/1988-152-0x0000000003B10000-0x0000000003B11000-memory.dmp

    Filesize

    4KB

  • memory/1988-153-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB