Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2023, 15:54

General

  • Target

    tmp.exe

  • Size

    32.5MB

  • MD5

    40462cb1d8678ec6103aa71655f15fe1

  • SHA1

    be4a958b79ab7c410b51911e272ec3e2e04f4ed7

  • SHA256

    7a7848da6e229abc1681d01407679d1dfdc9e7f7756b49fec1802d49be10f45c

  • SHA512

    2f4777b6104ce04baf2009e36bc3048ecc3deefa342d12f9ebfaeaa1eb6db36fb4600915fd3b52d0764e609527778150e1a1c8b0f227372458997dbdca439af5

  • SSDEEP

    786432:RNhjKQH/s50/ChVnfAz/DCGEBqscfa+IWpSxk8unu/3T7nrNtm:vhjKQHA0/yVnIz/H3fJnpKSu/TVc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 192
      2⤵
      • Program crash
      PID:4940
    • F:\ÏÐÔƳÁĬ\tmp.exe
      F:\ÏÐÔƳÁĬ\tmp.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:228
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 240
        3⤵
        • Program crash
        PID:3176
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3576 -ip 3576
    1⤵
      PID:2032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 228 -ip 228
      1⤵
        PID:4064

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

        Filesize

        9KB

        MD5

        7050d5ae8acfbe560fa11073fef8185d

        SHA1

        5bc38e77ff06785fe0aec5a345c4ccd15752560e

        SHA256

        cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

        SHA512

        a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2K9QMOPD\20221203[1].htm

        Filesize

        2KB

        MD5

        b74044159bc87d1e9b0053b05ee8c13b

        SHA1

        bdfd7cbcc86f3b900344754e1da6cd22d15f1b9a

        SHA256

        e6f5617910b0ae36ee54ee66aa80915372615a385e825b769b6660213d7c0f4b

        SHA512

        75878a30633bc68819ec014224adc9c2e8fcd11901a728bda8ef596275ac28d34d4de1144f45245429f9c0e2e83e6498c91514f27e038b745a45ada7e5575c43

      • C:\Users\Admin\Desktop\ÏÐÔƳÁĬv2x.lnk

        Filesize

        1KB

        MD5

        0c823a27daf4bcafdee2ac72af899b09

        SHA1

        ee2eedb68d26c271b122e9868906165ff0390848

        SHA256

        21f4dd2f0d35dca8c8d943ef22b7e8e9d82a650bdc5803bdceaa44ad5a90b666

        SHA512

        0a08b8d2d63583c3c185b9bc93f9ac8dc2154ade245f781c1e63a2b10133f8ba48c6f15e4089f9645bdd82c0a3d7c5bba04ae8e67446faab1b7f5036e8546dfd

      • F:\ÏÐÔƳÁĬ\LoginFail.ini

        Filesize

        65B

        MD5

        af441ee6cc63a15272f02b63b41130bf

        SHA1

        23868ed627cdc35dc83bc25df29c32e0c2d07a09

        SHA256

        c6b9dd4898fae4007953e62330b7dd5444ed062dea4436298d23c6338f3317c9

        SHA512

        e8c2851f7cf9fedb0b706e76064b7bc19ecf14bd280902e5dce0d6092a2461280646f294d608965b42af9d618c70590171fe8fa6851d10a87ae92dcd4522879d

      • F:\ÏÐÔƳÁĬ\LoginTemp.ini

        Filesize

        30B

        MD5

        9b2456363290ba7d3b58b22d66ce6a18

        SHA1

        43f3a27739354d6a21dab842e5910205eb7ebe6b

        SHA256

        95b5335823c05e3acf512d08169bf4cc9925d70e96b72e83b472cb55b094e218

        SHA512

        3eceb636eb660bf20d558a396a0ac186902974e9737354577b301765407c98c94f800c62083f6e648bd576da8a84e414919a7a99144b409befea5bb86b48cbba

      • F:\ÏÐÔƳÁĬ\tmp.exe

        Filesize

        32.5MB

        MD5

        40462cb1d8678ec6103aa71655f15fe1

        SHA1

        be4a958b79ab7c410b51911e272ec3e2e04f4ed7

        SHA256

        7a7848da6e229abc1681d01407679d1dfdc9e7f7756b49fec1802d49be10f45c

        SHA512

        2f4777b6104ce04baf2009e36bc3048ecc3deefa342d12f9ebfaeaa1eb6db36fb4600915fd3b52d0764e609527778150e1a1c8b0f227372458997dbdca439af5

      • F:\ÏÐÔƳÁĬ\tmp.exe

        Filesize

        32.5MB

        MD5

        40462cb1d8678ec6103aa71655f15fe1

        SHA1

        be4a958b79ab7c410b51911e272ec3e2e04f4ed7

        SHA256

        7a7848da6e229abc1681d01407679d1dfdc9e7f7756b49fec1802d49be10f45c

        SHA512

        2f4777b6104ce04baf2009e36bc3048ecc3deefa342d12f9ebfaeaa1eb6db36fb4600915fd3b52d0764e609527778150e1a1c8b0f227372458997dbdca439af5

      • memory/228-148-0x0000000002F40000-0x0000000002F41000-memory.dmp

        Filesize

        4KB

      • memory/228-169-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

        Filesize

        4KB

      • memory/228-170-0x0000000002F40000-0x0000000002F41000-memory.dmp

        Filesize

        4KB

      • memory/228-190-0x0000000000400000-0x0000000002D7D000-memory.dmp

        Filesize

        41.5MB

      • memory/3576-142-0x0000000000400000-0x0000000002D7D000-memory.dmp

        Filesize

        41.5MB

      • memory/3576-133-0x0000000000400000-0x0000000002D7D000-memory.dmp

        Filesize

        41.5MB

      • memory/3576-134-0x0000000003310000-0x0000000003311000-memory.dmp

        Filesize

        4KB