Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2023, 18:41

General

  • Target

    NA_NA_25791e26ac31c1exeexe_JC.exe

  • Size

    5.8MB

  • MD5

    25791e26ac31c11e6dfc0b57d34b7e2c

  • SHA1

    ead6e42ab4a0580f523c24884c66bd0e5774609d

  • SHA256

    10cff7f6b89a464cb556818e96c4290d0be051cac8389ae7a00997deee7268e7

  • SHA512

    4554169d7b4bb6738bd826e47b8e80c3564587c69ee0d9d12763bf3ba9ad0f5d5ed22c9296ad6688886d065dee97799d8095c2dfe9a8fe1fb02c1a95de83871d

  • SSDEEP

    98304:Qd6RAG3iQ8op+ezwWwNIyTQbMGLd51YkPu4cJMGBj4DhDZANxBYtsz:dHL8opj2TMM0LNPy8DpZ+C2z

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NA_NA_25791e26ac31c1exeexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NA_NA_25791e26ac31c1exeexe_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\svchost.exe
      /svchost.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.exe
        "C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2608
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.bat""
        3⤵
          PID:2244
      • C:\Users\Admin\AppData\Local\Temp\UMDO.UDC
        "C:\Users\Admin\AppData\Local\Temp\UMDO.UDC"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\svchost.exe
          /svchost.exe
          3⤵
          • Executes dropped EXE
          PID:2100
        • C:\svchost.exe
          /svchost.exe
          3⤵
          • Executes dropped EXE
          PID:3040
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\\sjr.dll"
          3⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.bat

      Filesize

      78B

      MD5

      79d1f3542288968cdf3a15829cd3ec0d

      SHA1

      8b2685cd5ad3ba347a8aa02f3ec318d1a3aab1ae

      SHA256

      23b0df4ea63b05aa6196636b42451b5d80605ad1a7cf0b439fe072281218afe6

      SHA512

      eec253600b5365cfee5889bfc9eefd33103e0be95757e6fdb333a674c332a978cd79c06437cdc418c7df4c2f72ce917e08fe2a536989c3e50cb0f62a79d464bf

    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.exe

      Filesize

      707KB

      MD5

      6be57b5f84b3ae053023dbf7d64ab7e1

      SHA1

      b02656c26acfdb2357fa54b918ed9019600f80de

      SHA256

      06cd62623d3a299d9e86d6c2154d1736356d373a322cdff3a54e940ecfee6030

      SHA512

      369f9b6e81caadbd3eecc8e3c9a676396a7432d6bc847e8710872ef296a36c34c4bdc3ad39e285b6f9bad51fd4dff2062816f69e192c93bbfd11580d2ec2226f

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\svchost.bat

      Filesize

      78B

      MD5

      79d1f3542288968cdf3a15829cd3ec0d

      SHA1

      8b2685cd5ad3ba347a8aa02f3ec318d1a3aab1ae

      SHA256

      23b0df4ea63b05aa6196636b42451b5d80605ad1a7cf0b439fe072281218afe6

      SHA512

      eec253600b5365cfee5889bfc9eefd33103e0be95757e6fdb333a674c332a978cd79c06437cdc418c7df4c2f72ce917e08fe2a536989c3e50cb0f62a79d464bf

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\svchost.exe

      Filesize

      707KB

      MD5

      6be57b5f84b3ae053023dbf7d64ab7e1

      SHA1

      b02656c26acfdb2357fa54b918ed9019600f80de

      SHA256

      06cd62623d3a299d9e86d6c2154d1736356d373a322cdff3a54e940ecfee6030

      SHA512

      369f9b6e81caadbd3eecc8e3c9a676396a7432d6bc847e8710872ef296a36c34c4bdc3ad39e285b6f9bad51fd4dff2062816f69e192c93bbfd11580d2ec2226f

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\svchost.exe

      Filesize

      707KB

      MD5

      6be57b5f84b3ae053023dbf7d64ab7e1

      SHA1

      b02656c26acfdb2357fa54b918ed9019600f80de

      SHA256

      06cd62623d3a299d9e86d6c2154d1736356d373a322cdff3a54e940ecfee6030

      SHA512

      369f9b6e81caadbd3eecc8e3c9a676396a7432d6bc847e8710872ef296a36c34c4bdc3ad39e285b6f9bad51fd4dff2062816f69e192c93bbfd11580d2ec2226f

    • C:\Users\Admin\AppData\Local\Temp\UMDO.UDC

      Filesize

      5.8MB

      MD5

      93c3fcdbf0e75fca59b23828b41c0756

      SHA1

      9a5783c51365b705e26a270391c0f3fcf45a0086

      SHA256

      b55be718b7cdcbade856e1cc9500ca823434e2576fcf55a3ecd8548dd5e3193a

      SHA512

      0dea80d8ae05208ac7ce41ffc0ea416bccb5866f740569bb4e28d649d4479492d080dfb80febae8c68b322948694489ad6c84db7175acfb2002927324a3f78a1

    • C:\Users\Admin\AppData\Local\Temp\UMDO.UDC

      Filesize

      5.8MB

      MD5

      93c3fcdbf0e75fca59b23828b41c0756

      SHA1

      9a5783c51365b705e26a270391c0f3fcf45a0086

      SHA256

      b55be718b7cdcbade856e1cc9500ca823434e2576fcf55a3ecd8548dd5e3193a

      SHA512

      0dea80d8ae05208ac7ce41ffc0ea416bccb5866f740569bb4e28d649d4479492d080dfb80febae8c68b322948694489ad6c84db7175acfb2002927324a3f78a1

    • C:\Users\Admin\AppData\Local\Temp\UMDO.UDC

      Filesize

      5.8MB

      MD5

      93c3fcdbf0e75fca59b23828b41c0756

      SHA1

      9a5783c51365b705e26a270391c0f3fcf45a0086

      SHA256

      b55be718b7cdcbade856e1cc9500ca823434e2576fcf55a3ecd8548dd5e3193a

      SHA512

      0dea80d8ae05208ac7ce41ffc0ea416bccb5866f740569bb4e28d649d4479492d080dfb80febae8c68b322948694489ad6c84db7175acfb2002927324a3f78a1

    • C:\Users\Admin\AppData\Local\Temp\sjr.dll

      Filesize

      2.1MB

      MD5

      3bdb92b38bdc6a5702ec1454534d0951

      SHA1

      9276b0c8de889744fcdf34e7c81e158830b8bcbb

      SHA256

      25ba0f3a0f6ddb0e9b0078640a8a2a2bf7e8948e0579d2080379debc8a272681

      SHA512

      cff7a9033f7a141f52f0ad3152e97a5313f1185669d9e6da4d60a68602c6a1af3ec5250e1c39ea328758419e5d0a826bb5085f3e96fa4019f3c5c2e586f1c35f

    • C:\svchost.exe

      Filesize

      707KB

      MD5

      6be57b5f84b3ae053023dbf7d64ab7e1

      SHA1

      b02656c26acfdb2357fa54b918ed9019600f80de

      SHA256

      06cd62623d3a299d9e86d6c2154d1736356d373a322cdff3a54e940ecfee6030

      SHA512

      369f9b6e81caadbd3eecc8e3c9a676396a7432d6bc847e8710872ef296a36c34c4bdc3ad39e285b6f9bad51fd4dff2062816f69e192c93bbfd11580d2ec2226f

    • C:\svchost.exe

      Filesize

      707KB

      MD5

      6be57b5f84b3ae053023dbf7d64ab7e1

      SHA1

      b02656c26acfdb2357fa54b918ed9019600f80de

      SHA256

      06cd62623d3a299d9e86d6c2154d1736356d373a322cdff3a54e940ecfee6030

      SHA512

      369f9b6e81caadbd3eecc8e3c9a676396a7432d6bc847e8710872ef296a36c34c4bdc3ad39e285b6f9bad51fd4dff2062816f69e192c93bbfd11580d2ec2226f

    • C:\svchost.exe

      Filesize

      707KB

      MD5

      6be57b5f84b3ae053023dbf7d64ab7e1

      SHA1

      b02656c26acfdb2357fa54b918ed9019600f80de

      SHA256

      06cd62623d3a299d9e86d6c2154d1736356d373a322cdff3a54e940ecfee6030

      SHA512

      369f9b6e81caadbd3eecc8e3c9a676396a7432d6bc847e8710872ef296a36c34c4bdc3ad39e285b6f9bad51fd4dff2062816f69e192c93bbfd11580d2ec2226f

    • C:\svchost.exe

      Filesize

      707KB

      MD5

      6be57b5f84b3ae053023dbf7d64ab7e1

      SHA1

      b02656c26acfdb2357fa54b918ed9019600f80de

      SHA256

      06cd62623d3a299d9e86d6c2154d1736356d373a322cdff3a54e940ecfee6030

      SHA512

      369f9b6e81caadbd3eecc8e3c9a676396a7432d6bc847e8710872ef296a36c34c4bdc3ad39e285b6f9bad51fd4dff2062816f69e192c93bbfd11580d2ec2226f

    • \Program Files\Common Files\Microsoft Shared\MSInfo\svchost.exe

      Filesize

      707KB

      MD5

      6be57b5f84b3ae053023dbf7d64ab7e1

      SHA1

      b02656c26acfdb2357fa54b918ed9019600f80de

      SHA256

      06cd62623d3a299d9e86d6c2154d1736356d373a322cdff3a54e940ecfee6030

      SHA512

      369f9b6e81caadbd3eecc8e3c9a676396a7432d6bc847e8710872ef296a36c34c4bdc3ad39e285b6f9bad51fd4dff2062816f69e192c93bbfd11580d2ec2226f

    • \Users\Admin\AppData\Local\Temp\UMDO.UDC

      Filesize

      5.8MB

      MD5

      93c3fcdbf0e75fca59b23828b41c0756

      SHA1

      9a5783c51365b705e26a270391c0f3fcf45a0086

      SHA256

      b55be718b7cdcbade856e1cc9500ca823434e2576fcf55a3ecd8548dd5e3193a

      SHA512

      0dea80d8ae05208ac7ce41ffc0ea416bccb5866f740569bb4e28d649d4479492d080dfb80febae8c68b322948694489ad6c84db7175acfb2002927324a3f78a1

    • \Users\Admin\AppData\Local\Temp\UMDO.UDC

      Filesize

      5.8MB

      MD5

      93c3fcdbf0e75fca59b23828b41c0756

      SHA1

      9a5783c51365b705e26a270391c0f3fcf45a0086

      SHA256

      b55be718b7cdcbade856e1cc9500ca823434e2576fcf55a3ecd8548dd5e3193a

      SHA512

      0dea80d8ae05208ac7ce41ffc0ea416bccb5866f740569bb4e28d649d4479492d080dfb80febae8c68b322948694489ad6c84db7175acfb2002927324a3f78a1

    • \Users\Admin\AppData\Local\Temp\sjr.dll

      Filesize

      2.1MB

      MD5

      3bdb92b38bdc6a5702ec1454534d0951

      SHA1

      9276b0c8de889744fcdf34e7c81e158830b8bcbb

      SHA256

      25ba0f3a0f6ddb0e9b0078640a8a2a2bf7e8948e0579d2080379debc8a272681

      SHA512

      cff7a9033f7a141f52f0ad3152e97a5313f1185669d9e6da4d60a68602c6a1af3ec5250e1c39ea328758419e5d0a826bb5085f3e96fa4019f3c5c2e586f1c35f

    • \Users\Admin\AppData\Local\Temp\sjr.dll

      Filesize

      2.1MB

      MD5

      3bdb92b38bdc6a5702ec1454534d0951

      SHA1

      9276b0c8de889744fcdf34e7c81e158830b8bcbb

      SHA256

      25ba0f3a0f6ddb0e9b0078640a8a2a2bf7e8948e0579d2080379debc8a272681

      SHA512

      cff7a9033f7a141f52f0ad3152e97a5313f1185669d9e6da4d60a68602c6a1af3ec5250e1c39ea328758419e5d0a826bb5085f3e96fa4019f3c5c2e586f1c35f

    • memory/2100-86-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2100-114-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2100-87-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2184-59-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2184-85-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2608-67-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2608-153-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2608-160-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2608-110-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2640-108-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-138-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-112-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-104-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-116-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-118-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-120-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-122-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-124-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-126-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-128-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-130-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-132-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-134-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-136-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-106-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-102-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-100-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-91-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-98-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-96-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-154-0x0000000073C70000-0x000000007413B000-memory.dmp

      Filesize

      4.8MB

    • memory/2640-93-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-149-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-150-0x0000000073C70000-0x000000007413B000-memory.dmp

      Filesize

      4.8MB

    • memory/2640-94-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/2640-151-0x0000000073C70000-0x000000007413B000-memory.dmp

      Filesize

      4.8MB

    • memory/2808-146-0x00000000743E0000-0x00000000748AB000-memory.dmp

      Filesize

      4.8MB

    • memory/2808-145-0x00000000743E0000-0x00000000748AB000-memory.dmp

      Filesize

      4.8MB

    • memory/3040-141-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB