Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2023, 23:11

General

  • Target

    Original/loader_9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25.exe

  • Size

    313KB

  • MD5

    2f08d1f1b1968be7f9669e2ff94dea76

  • SHA1

    168befbd8691891fc9a983da90a80bff0aa79cb1

  • SHA256

    9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25

  • SHA512

    3dc06215caeff44944f577a5040a7f5ea89c16988021dd34dd914c110cd82052b4e4e8a1190568ed1bda89887bc4b132ac965818406b652c91a30acfc3b0ec5a

  • SSDEEP

    6144:ixxjPBn35E+ZXJtWc/yx1kk5NiIm4ALtvhwhz1m9r8:iTrZpEePWQyx5fiIm4otZm

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Original\loader_9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25.exe
    "C:\Users\Admin\AppData\Local\Temp\Original\loader_9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\Original\loader_9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25.exe
      "C:\Users\Admin\AppData\Local\Temp\Original\loader_9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\PExbsodKQJbcNlY.exe
        C:\Users\Admin\AppData\Local\Temp\Original\loader_9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Windows\PExbsodKQJbcNlY.exe
          C:\Users\Admin\AppData\Local\Temp\Original\loader_9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25.exe
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2292
  • C:\Windows\system32\wbem\wmiprvse.exe
    C:\Windows\system32\wbem\wmiprvse.exe -Embedding
    1⤵
      PID:2904

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\PExbsodKQJbcNlY.exe

      Filesize

      313KB

      MD5

      2f08d1f1b1968be7f9669e2ff94dea76

      SHA1

      168befbd8691891fc9a983da90a80bff0aa79cb1

      SHA256

      9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25

      SHA512

      3dc06215caeff44944f577a5040a7f5ea89c16988021dd34dd914c110cd82052b4e4e8a1190568ed1bda89887bc4b132ac965818406b652c91a30acfc3b0ec5a

    • C:\Windows\PExbsodKQJbcNlY.exe

      Filesize

      313KB

      MD5

      2f08d1f1b1968be7f9669e2ff94dea76

      SHA1

      168befbd8691891fc9a983da90a80bff0aa79cb1

      SHA256

      9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25

      SHA512

      3dc06215caeff44944f577a5040a7f5ea89c16988021dd34dd914c110cd82052b4e4e8a1190568ed1bda89887bc4b132ac965818406b652c91a30acfc3b0ec5a

    • C:\Windows\PExbsodKQJbcNlY.exe

      Filesize

      313KB

      MD5

      2f08d1f1b1968be7f9669e2ff94dea76

      SHA1

      168befbd8691891fc9a983da90a80bff0aa79cb1

      SHA256

      9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25

      SHA512

      3dc06215caeff44944f577a5040a7f5ea89c16988021dd34dd914c110cd82052b4e4e8a1190568ed1bda89887bc4b132ac965818406b652c91a30acfc3b0ec5a

    • C:\Windows\PExbsodKQJbcNlY.exe

      Filesize

      313KB

      MD5

      2f08d1f1b1968be7f9669e2ff94dea76

      SHA1

      168befbd8691891fc9a983da90a80bff0aa79cb1

      SHA256

      9b313e9c79921b22b488a11344b280d4cec9dd09c2201f9e5aaf08a115650b25

      SHA512

      3dc06215caeff44944f577a5040a7f5ea89c16988021dd34dd914c110cd82052b4e4e8a1190568ed1bda89887bc4b132ac965818406b652c91a30acfc3b0ec5a

    • memory/600-97-0x0000000000250000-0x000000000028F000-memory.dmp

      Filesize

      252KB

    • memory/600-90-0x0000000000250000-0x000000000028F000-memory.dmp

      Filesize

      252KB

    • memory/600-89-0x0000000000150000-0x0000000000189000-memory.dmp

      Filesize

      228KB

    • memory/600-82-0x0000000000250000-0x000000000028F000-memory.dmp

      Filesize

      252KB

    • memory/600-85-0x0000000000250000-0x000000000028F000-memory.dmp

      Filesize

      252KB

    • memory/600-84-0x0000000000250000-0x000000000028F000-memory.dmp

      Filesize

      252KB

    • memory/600-100-0x0000000000250000-0x000000000028F000-memory.dmp

      Filesize

      252KB

    • memory/600-79-0x0000000000150000-0x0000000000189000-memory.dmp

      Filesize

      228KB

    • memory/2292-86-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/2292-78-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/2336-58-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/2336-54-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/2336-55-0x0000000001CA0000-0x0000000001CF4000-memory.dmp

      Filesize

      336KB

    • memory/2548-74-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/2548-70-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/2760-71-0x00000000001A0000-0x00000000001F4000-memory.dmp

      Filesize

      336KB

    • memory/2760-66-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/2760-67-0x00000000001A0000-0x00000000001F4000-memory.dmp

      Filesize

      336KB

    • memory/2760-60-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/2760-92-0x00000000001A0000-0x00000000001F4000-memory.dmp

      Filesize

      336KB

    • memory/2760-59-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB

    • memory/2760-56-0x0000000000400000-0x0000000000460000-memory.dmp

      Filesize

      384KB