Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/05/2023, 22:52

230512-2tm42aha2v 8

Analysis

  • max time kernel
    39s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2023, 22:52

General

  • Target

    EAappInstaller.exe

  • Size

    2.4MB

  • MD5

    f1110a1901aaedae7e072440d8b49e18

  • SHA1

    ebc8448a611d3dcd7ba79fb5441eae1dfd09d409

  • SHA256

    c68acde54d602e9acf20b3e5148e6b0d933a2353201337a0b97828ab1b7de340

  • SHA512

    d67f2350684e044131cb370722750eaad8acba047f550c5c738daf279cc93e53b7e55a6af5829e4bd1e26cb7039a0b9600d45f5f14e42860bc7f367b39546be1

  • SSDEEP

    49152:vT2pZ1kX9GzOcAxgjXE5AcjPqVA9RF2qs/4:vT0cXYKPxY05AcjPhRF274

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EAappInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\EAappInstaller.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Windows\Temp\{ACF3C812-A838-4EB5-AC00-58A6093AE45E}\.cr\EAappInstaller.exe
      "C:\Windows\Temp\{ACF3C812-A838-4EB5-AC00-58A6093AE45E}\.cr\EAappInstaller.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\EAappInstaller.exe" -burn.filehandle.attached=180 -burn.filehandle.self=188
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:1420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab1B41.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Windows\Temp\{ACF3C812-A838-4EB5-AC00-58A6093AE45E}\.cr\EAappInstaller.exe

    Filesize

    2.4MB

    MD5

    f1110a1901aaedae7e072440d8b49e18

    SHA1

    ebc8448a611d3dcd7ba79fb5441eae1dfd09d409

    SHA256

    c68acde54d602e9acf20b3e5148e6b0d933a2353201337a0b97828ab1b7de340

    SHA512

    d67f2350684e044131cb370722750eaad8acba047f550c5c738daf279cc93e53b7e55a6af5829e4bd1e26cb7039a0b9600d45f5f14e42860bc7f367b39546be1

  • C:\Windows\Temp\{ACF3C812-A838-4EB5-AC00-58A6093AE45E}\.cr\EAappInstaller.exe

    Filesize

    2.4MB

    MD5

    f1110a1901aaedae7e072440d8b49e18

    SHA1

    ebc8448a611d3dcd7ba79fb5441eae1dfd09d409

    SHA256

    c68acde54d602e9acf20b3e5148e6b0d933a2353201337a0b97828ab1b7de340

    SHA512

    d67f2350684e044131cb370722750eaad8acba047f550c5c738daf279cc93e53b7e55a6af5829e4bd1e26cb7039a0b9600d45f5f14e42860bc7f367b39546be1

  • \Windows\Temp\{7912F5E6-049C-43AC-BB28-E4EAC0122927}\.ba\juno-bootstrapper-application.dll

    Filesize

    3.1MB

    MD5

    8785b794b2bb04e565a2693ebec4a3e8

    SHA1

    58accc1e18e95596cf7049c2424acb2fbd5a6ffc

    SHA256

    874b69fa848e33c9e5fd809c3e21e41627a9bbc0448984498d1ae8c99e14d2cf

    SHA512

    e167bda94ffc0395e1c248fc537017c8bb1215985c0873e57a1a676295ff5d3b729cf19ea7527dcd2b8d91089f5103a0740378d3d1c363f80f6934bb7aeb698b

  • \Windows\Temp\{ACF3C812-A838-4EB5-AC00-58A6093AE45E}\.cr\EAappInstaller.exe

    Filesize

    2.4MB

    MD5

    f1110a1901aaedae7e072440d8b49e18

    SHA1

    ebc8448a611d3dcd7ba79fb5441eae1dfd09d409

    SHA256

    c68acde54d602e9acf20b3e5148e6b0d933a2353201337a0b97828ab1b7de340

    SHA512

    d67f2350684e044131cb370722750eaad8acba047f550c5c738daf279cc93e53b7e55a6af5829e4bd1e26cb7039a0b9600d45f5f14e42860bc7f367b39546be1