Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2023, 16:37

General

  • Target

    Malicious_11bbb8ca0435040b0d6fd2e57e50f81c6d84f28edabee8c93e96e77483087e0d.exe

  • Size

    3.9MB

  • MD5

    1ab5592eff26b3f25093765a5f6a305b

  • SHA1

    7f3b99bb23b5cd2627fa5660a64739b7f620da45

  • SHA256

    a522f8997956cea071dc783305018ba65c2563cac618dc31365f34ca31d1eb9d

  • SHA512

    83266ea89e4892f965a4f87a134dbd89ca6ed78b1a252277928942fab2f130598ffaa0ce3b92bb7f5d8851ea64e24cfcf326ea48f85fbf128bc6ee86483ba8b0

  • SSDEEP

    98304:rv6W8zntQwyUgOlHpKjcCAYSmOppy3Olar:r6ftKKlHpUChgr

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Modifies system certificate store 2 TTPs 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malicious_11bbb8ca0435040b0d6fd2e57e50f81c6d84f28edabee8c93e96e77483087e0d.exe
    "C:\Users\Admin\AppData\Local\Temp\Malicious_11bbb8ca0435040b0d6fd2e57e50f81c6d84f28edabee8c93e96e77483087e0d.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa48e5f5cdb5f5b28af3196b585bbbd1

    SHA1

    04c33d539b085e06c3e6fb290401be99c8795d95

    SHA256

    6671bb2c89039e654a4331e375d3e6b67979c6981091ac212ef4265164e91ec5

    SHA512

    9ce3f6620e9ee9d84efd49920a9c73983b12a9b872b9b23c7cf2b1c83b947bfde5edf03332fb0d97c7ad2fa5331011b212dccd213278428b672a105c170b6363

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1be18fa7aaedd6c3d73d475c4d0d7fa

    SHA1

    2fbc90f3d8f65ff8798f137a2fb0a83adf959b27

    SHA256

    86a8626359d94d49fbad10bdb2b2a68186dbac7497dc273bc68aa4807b26c6e9

    SHA512

    88d4e23618a367f51f1300b25b06266d30952e3dd7a5a25701985efa919352e101bf1763be84fcc9dbdaefcee85446703c682ab9bf3be330a9412ed96991c1d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    df6c77058e2b47d7c981b62172c9f791

    SHA1

    be307d6a442cb5eea9ac6a58f8ddbf44098be60a

    SHA256

    6a9ec2cb9e8d10043252985e38bfe1f03fad3d163655428f134c96fa6f7da240

    SHA512

    9ebeb52fd80e7373d6174139862fc19c550da49e817f1f87f438f2092980527404600b6600526f76fc2c3c91cf2b7aa9897b3a21fc49bf89c3604db98d766d7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb98593db435a7498cfcaf6acb4261c7

    SHA1

    2f62230dc9ff525b675edc83574924975d3a93ea

    SHA256

    eb6ba885662ad34cae754f0351adcf21a0fdada3f89642db66dda46ae174d957

    SHA512

    f4a502efacdf6a3fc6afa8322a207888d6f4e113f8fd91ef6ea3a63782c5b3ce9cdec2d462ce49138e4bcf20849c6d9d17d0ee2593c97ad56b9ac757fc9f8f8d

  • C:\Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.Net.dll

    Filesize

    102KB

    MD5

    0b036ce556e8c7c403948068d810f32a

    SHA1

    3a9fa76153f498c52dec62aa796322b4319602b8

    SHA256

    fc9bf8465906f8f9c979d976bd833d403af1c0d3000ad555420347794e6c4a4d

    SHA512

    08493c4400db8c9aca3219c01c906c5031f6ab22ab97b2d2968e673283c86ed4014a136f5f7d97967a5a307ce616d15551ea8d1888027e73995daeb8c3f9343e

  • C:\Users\Admin\AppData\Local\Temp\Cab1038.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Malicious_11bbb8ca0435040b0d6fd2e57e50f81c6d84f28edabee8c93e96e77483087e0d.exe_1691426274\Resources\OfferPage.html

    Filesize

    1KB

    MD5

    1b89a91596bb6a55b1d1359ddfa97dca

    SHA1

    b28458e2324405fefbd24d1e856e44588cc16bb6

    SHA256

    b14ff8b15860e373662c8fe25eb7f2ee2775e73a4c1f90b6b8485b085034ce4a

    SHA512

    e7f82533cbb00145afd9e6cab455e2a20a18d43438a6a7e1a68185a1b845b7540ae86a18baadd936773ac9b523f344a1a056ec965ebfdbba7101d535cea11118

  • C:\Users\Admin\AppData\Local\Temp\Tar1164.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.Net.dll

    Filesize

    102KB

    MD5

    0b036ce556e8c7c403948068d810f32a

    SHA1

    3a9fa76153f498c52dec62aa796322b4319602b8

    SHA256

    fc9bf8465906f8f9c979d976bd833d403af1c0d3000ad555420347794e6c4a4d

    SHA512

    08493c4400db8c9aca3219c01c906c5031f6ab22ab97b2d2968e673283c86ed4014a136f5f7d97967a5a307ce616d15551ea8d1888027e73995daeb8c3f9343e

  • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.Net.dll

    Filesize

    102KB

    MD5

    0b036ce556e8c7c403948068d810f32a

    SHA1

    3a9fa76153f498c52dec62aa796322b4319602b8

    SHA256

    fc9bf8465906f8f9c979d976bd833d403af1c0d3000ad555420347794e6c4a4d

    SHA512

    08493c4400db8c9aca3219c01c906c5031f6ab22ab97b2d2968e673283c86ed4014a136f5f7d97967a5a307ce616d15551ea8d1888027e73995daeb8c3f9343e

  • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.Net.dll

    Filesize

    102KB

    MD5

    0b036ce556e8c7c403948068d810f32a

    SHA1

    3a9fa76153f498c52dec62aa796322b4319602b8

    SHA256

    fc9bf8465906f8f9c979d976bd833d403af1c0d3000ad555420347794e6c4a4d

    SHA512

    08493c4400db8c9aca3219c01c906c5031f6ab22ab97b2d2968e673283c86ed4014a136f5f7d97967a5a307ce616d15551ea8d1888027e73995daeb8c3f9343e

  • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\ServiceHide.dll

    Filesize

    150KB

    MD5

    0d7c4de3212dac9329f46bb780eac784

    SHA1

    45c1cc1311c4cbe9e4c39ef48c44d854cce7ac58

    SHA256

    7ff7055e68fb43ddfda6c7c1e99dfd46b3b76654040dae920de0bb79b67aceb3

    SHA512

    7f556b23fbce587f5d5370c16337d63258a09333fe1a58fb0966cfd9d96029129e48a460de7b51d5fb561a9bea73bbdf9117c61e88d63aff87f36bd2bbb8fed8

  • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\msvcp140.dll

    Filesize

    426KB

    MD5

    8ff1898897f3f4391803c7253366a87b

    SHA1

    9bdbeed8f75a892b6b630ef9e634667f4c620fa0

    SHA256

    51398691feef7ae0a876b523aec47c4a06d9a1ee62f1a0aee27de6d6191c68ad

    SHA512

    cb071ad55beaa541b5baf1f7d5e145f2c26fbee53e535e8c31b8f2b8df4bf7723f7bef214b670b2c3de57a4a75711dd204a940a2158939ad72f551e32da7ab03

  • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\sciter32.dll

    Filesize

    5.6MB

    MD5

    b431083586e39d018e19880ad1a5ce8f

    SHA1

    3bbf957ab534d845d485a8698accc0a40b63cedd

    SHA256

    b525fdcc32c5a359a7f5738a30eff0c6390734d8a2c987c62e14c619f99d406b

    SHA512

    7805a3464fcc3ac4ea1258e2412180c52f2af40a79b540348486c830a20c2bbed337bbf5f4a8926b3ef98c63c87747014f5b43c35f7ec4e7a3693b9dbd0ae67b

  • \Users\Admin\AppData\Local\Temp\3dba2b032e844ea98475f6258ce8bb25\vcruntime140.dll

    Filesize

    74KB

    MD5

    1a84957b6e681fca057160cd04e26b27

    SHA1

    8d7e4c98d1ec858db26a3540baaaa9bbf96b5bfe

    SHA256

    9faeaa45e8cc986af56f28350b38238b03c01c355e9564b849604b8d690919c5

    SHA512

    5f54c9e87f2510c56f3cf2ceeb5b5ad7711abd9f85a1ff84e74dd82d15181505e7e5428eae6ff823f1190964eb0a82a569273a4562ec4131cecfa00a9d0d02aa

  • memory/2176-53-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2176-226-0x00000000741C0000-0x00000000748AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2176-82-0x00000000009E0000-0x00000000009FD000-memory.dmp

    Filesize

    116KB

  • memory/2176-187-0x0000000006850000-0x00000000068DC000-memory.dmp

    Filesize

    560KB

  • memory/2176-200-0x0000000005330000-0x000000000534A000-memory.dmp

    Filesize

    104KB

  • memory/2176-206-0x0000000000950000-0x0000000000990000-memory.dmp

    Filesize

    256KB

  • memory/2176-205-0x0000000005690000-0x00000000056BE000-memory.dmp

    Filesize

    184KB

  • memory/2176-75-0x00000000004D0000-0x00000000004F8000-memory.dmp

    Filesize

    160KB

  • memory/2176-227-0x0000000000950000-0x0000000000990000-memory.dmp

    Filesize

    256KB

  • memory/2176-93-0x0000000004780000-0x0000000004792000-memory.dmp

    Filesize

    72KB

  • memory/2176-76-0x0000000000AF0000-0x0000000000B1C000-memory.dmp

    Filesize

    176KB

  • memory/2176-56-0x0000000004E50000-0x000000000527E000-memory.dmp

    Filesize

    4.2MB

  • memory/2176-55-0x0000000000950000-0x0000000000990000-memory.dmp

    Filesize

    256KB

  • memory/2176-54-0x0000000000B80000-0x0000000000F6E000-memory.dmp

    Filesize

    3.9MB

  • memory/2176-491-0x0000000000950000-0x0000000000990000-memory.dmp

    Filesize

    256KB