Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2023, 19:19

General

  • Target

    tmp.exe

  • Size

    660KB

  • MD5

    9a3e1eee1cc88d5e7955f8a42f9cce61

  • SHA1

    817e02a3ce12dda64703d29c2ff2de7d882dee82

  • SHA256

    f450e7ab58e7ec8298127012ccc234e08f52fa004f579ab44459dcf081862824

  • SHA512

    4a870fbd5a941db961c4f0444f44193c36c1eb9f0e55f4bd3de937204f5d461367f05f024052bece87b5cc24ca7c4039e72afa3810bfabedead16a87e056e34b

  • SSDEEP

    12288:8HLUMuiv9RgfSjAzRty26xGJeMTE3Z2ap4srKWLZ6JCtXZYJfme:WtARD6EAMC41o6Jfme

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 16 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1544
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1304

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Setup_zffz.ini

    Filesize

    4KB

    MD5

    5f26ee1180f8808ca11636d5eb49495d

    SHA1

    7212dba86293b1d5dfb4f1a23bb60aa2bfebd563

    SHA256

    df68ac393e12c10402a525f558003a2df2c0a74664a596ca2e07d62bd4c09085

    SHA512

    a55493c0958ba9cf2c106c32432558690c6af099b52c8d31008ec825fa59cc3de5c7039a90b1536bcd8e58c753a6bdc4e2df59913c0ff230d24735d6b98cab46

  • C:\Users\Admin\AppData\Local\Temp\fjafu_zffz\0608\TEmp$$$$__myInetGetFile_20230528211934.ini

    Filesize

    954B

    MD5

    b4983c1aa57201d8866994cdbd8e8af8

    SHA1

    b963a5dec73daa8676520ef15faf484cee9dfe4c

    SHA256

    e182b5459c11004906d3e528e55f713e7c8602e006810fdce003bfd0f64c7c29

    SHA512

    31252c4717be4c3e8eab5c56504e9065d05fd92ae75fcf849a3e6b8f1d1f81847a77b88ca7bee53551eb651d29d7be5906a55958d26e916b89b3e03e0a1f5414

  • C:\Users\Admin\AppData\Local\Temp\zypgmb_zffz.ini

    Filesize

    107KB

    MD5

    2d03ff1b012497ff72fe803b4617b9e9

    SHA1

    0295e20a4727ae30b386a943e8870b4466664d7d

    SHA256

    3596e8fcb1cd8510afc78c5724ffe5741c3bcc149c03ff8ed6e227902275afd7

    SHA512

    61436da13151a8bf214c933c7f7de266000bbea3ad261a6fe8c74256e7caf7d7f20209c4c8659bbe2b49d62fec840f62464c416980d4939bf783e742b1277922

  • memory/1304-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1304-68-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1544-2398-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2042-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2395-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2396-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2397-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-65-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2399-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2400-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2401-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2402-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2403-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2404-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2405-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2406-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2407-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/1544-2408-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB