Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2023, 09:49

General

  • Target

    7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe

  • Size

    108KB

  • MD5

    7856c463dafa41e9ee8057c2a53b8f5f

  • SHA1

    414659752d234ea615756ebe527a18dceba408f6

  • SHA256

    7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984

  • SHA512

    cd947cc251a6b30b936bc2d056b152925a5c4e848c495b7f2b2a7da2278a4ef16b61603d2875a5f36999f784a22ec23b44b5b26449aed054f746b22d62455c5f

  • SSDEEP

    3072:7iQpRQqbfY7QRPVAziuhArAy72GRSQIrD:RRQqbfYePV6iuhAr5KGiD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • VMProtect packed file 12 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 11 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe
    "C:\Users\Admin\AppData\Local\Temp\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec.exe.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:2260
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec.ini.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:2088
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec1.exe.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:2988
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\UpLog.txt.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:1260
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\inc\GUI.inc.zip C:\Users\Admin\AppData\Local\Temp\inc\
      2⤵
      • Drops file in Windows directory
      PID:2224
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\inc\lib\gdi32.lib.zip C:\Users\Admin\AppData\Local\Temp\inc\lib\
      2⤵
      • Drops file in Windows directory
      PID:608
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\code\crc32.sec.zip C:\Users\Admin\AppData\Local\Temp\code\
      2⤵
      • Drops file in Windows directory
      PID:1400
    • C:\Users\Admin\AppData\Local\Temp\Sec.exe
      Sec.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Sec.exe

    Filesize

    108KB

    MD5

    dfa1023dace7cf6736ca42933f143761

    SHA1

    780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

    SHA256

    722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

    SHA512

    26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

  • C:\Users\Admin\AppData\Local\Temp\Sec.exe

    Filesize

    108KB

    MD5

    dfa1023dace7cf6736ca42933f143761

    SHA1

    780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

    SHA256

    722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

    SHA512

    26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

  • C:\Users\Admin\AppData\Local\Temp\Sec.ini

    Filesize

    180KB

    MD5

    dc71242c827305ef9608362bd8f7ae7f

    SHA1

    9cd2b8efd0a38c29fc309b1ca80a54cb1139998a

    SHA256

    08de077504ff3f9453e6dcd789c41feebaf24d335e9eec7f054a80faae63d2bc

    SHA512

    9bc733260dc4176bc5102a6b0a6d47857f065af28f6b752af576093e883cbdcc70a3fa5b80f9101a0d210fe8c80c9bfe969348d55ba7b95293cdc37a48f4e1b0

  • C:\Users\Admin\AppData\Local\Temp\Sec1.exe

    Filesize

    96KB

    MD5

    ce3d32362fb1c2e7fbba72cce95c3b0c

    SHA1

    a48c44ef67e0cf711733509e4233401f4f17380b

    SHA256

    76613df11b82f958b79783212b240701b12871db27a2050d32b4c6ae0d4dca1c

    SHA512

    d88e4b06893f7616a035f287c24115d666fc87d7319292a74534af0d29c7e2a8530b6da900266df43e47cb6224bfb7b4f1adba6dc5ad26ddf46dc7bda698ae93

  • C:\Users\Admin\AppData\Local\Temp\UpLog.txt

    Filesize

    28KB

    MD5

    ed0e0c142c05e3b4cb97929e8c045cf3

    SHA1

    734b648c9a6ab53a4eaba12668f545bdc0869212

    SHA256

    4f97c5f1be90b7cbed7bd3075561d09cb05cbb1e78d969fc06a152cbaac4f0d8

    SHA512

    efead23df6f778e0a02a991eaee164fd9cbe2d8638a317965367d30880e38fda6fce365e982109465d22eb7f8777b5f9c3d47088fb5f55a0129ee10d0f00d412

  • C:\Users\Admin\AppData\Local\Temp\code\crc32.sec

    Filesize

    1KB

    MD5

    b5413b8724dc740d100d83c5fb5474d6

    SHA1

    3d590964b543cc4fa5500fbff768fa2d0bf301de

    SHA256

    1acb643a84354be82518eece323c498c983236dd27001e9422c68d6c567cc65e

    SHA512

    b42f9b042db52e874b4e75f49fe90ba1a35573d734f8a43dc50c807129501821f263d8380b456cc4b0138c78519216ec64b3a356caac06fa393de195bd860b25

  • C:\Users\Admin\AppData\Local\Temp\inc\GUI.inc

    Filesize

    1KB

    MD5

    5d089846fdf9551981b4caa959168746

    SHA1

    efd43083b8b0fe656ed2ec9034bb82c38d50c86a

    SHA256

    2be5e2ff8dbfd24e189219de350550aa429e85aab9161daadeb0a25f91124204

    SHA512

    d54ba11884a3ba0a70280578ab2a16a8f7b0c3bc33ddd4d6d17e8b20b00b407f6834c531270e2a6d4ea3d28e18e6bdeccd2d61af1079547fedf93674567dadfd

  • C:\Users\Admin\AppData\Local\Temp\inc\lib\gdi32.lib

    Filesize

    14KB

    MD5

    28aa70c6d418cad7d09f72672682370b

    SHA1

    42f3903717183c6d6c7ab9d2d9b9cfe9c517dca6

    SHA256

    2c7c868dce813c91382b7d5d5414849019312abcd1996ee45946656f462b96e2

    SHA512

    15659d9b0225c2e6e02c02c771e8ae97568a415aa456217687e817fb8a92bb00f6c2afed245e83c2b78d7069aa310750f0cd4395f07a6fa086dde59d5859c539

  • C:\Windows\Logs\DPX\setupact.log

    Filesize

    10KB

    MD5

    bb47f93b97613095bb3a1342ffe2a7b4

    SHA1

    cf2f1c86f99b244c968c402757749dbf8de9dbc5

    SHA256

    764e502310c84f11943f247a64f3d2728eddfbcb4d4b4565e224f7629c924081

    SHA512

    d07c34021cec2848f0cbf1b387ec84de2b3fd9a0ea2ab9b76054c3397f65552b460d208dbafddb7184404d0eb74c4356f2ae21c33c06188d56eb8ca7385b3298

  • C:\Windows\Logs\DPX\setupact.log

    Filesize

    10KB

    MD5

    49725317ef3f5f2aebc2d4eacb5e1c4c

    SHA1

    e91d8ca9aa81ecbcf403176d45300f37fea37acf

    SHA256

    a7962c1fc9ea5655fe24e20e1f168a4dbcfd5e7d6419c97ef7e59e62bc6a219f

    SHA512

    7653dea8a09129b68f9963f13c554edb90d7a15d9b4f1d96daeca0886962783c5fae3810064c28b5dac175408f68ac13f981ce3d315a5e6eb08bf3bcb5866271

  • C:\Windows\Logs\DPX\setupact.log

    Filesize

    10KB

    MD5

    3567b2e9386a616ddaff6c5ce39e6e62

    SHA1

    e8fcd69a5ae79e68dd7f7617813166484d343782

    SHA256

    c3eb0259d16a10acaf71032a69335c1e825c25a91a5e3f29098bbfd278205c91

    SHA512

    89135a9e7ad8854fa6376d5190977946e71cf364c1f97c53e8e82665f58816fe43401cb8fafd8a44bff03661cb68c3b3bb25cc52240a7023df8b2bab363d38a9

  • C:\Windows\Logs\DPX\setupact.log

    Filesize

    6KB

    MD5

    5455f04434fd2228bc3644abd03e13ac

    SHA1

    15113018b5b824bd519d561720d31e40eb3d1602

    SHA256

    80ae383cf832d2c50f322f9cfef4f15e9f7ce70c78787b1fabf7ffbc455aa57f

    SHA512

    5488099db8f9e2ceafe197e5f23c0050e372ef5a4b9e2b1c1ca84e31e6bd8d7e44078aecc5ee259ebe9d95fb91926fa5c417a758bb174a784970b42a42588aa6

  • C:\Windows\Logs\DPX\setupact.log

    Filesize

    7KB

    MD5

    167451564ac805d409d0db766637071e

    SHA1

    ebacdd308e3c47bb26ddfc14b98076da8389fb8e

    SHA256

    2ff435c8421ed4950f6c74b548ae20cb24e37a1c1a72384fe383ee08d15df8fd

    SHA512

    7fc89cd5d3c2ddaa4310a97d3f8944bbcfc8e40991cd89d3a37a7805521a42a3ca2081e028538b273bd1554a8bda0d54018bb509462e6500399dad60fd093b18

  • C:\Windows\Logs\DPX\setupact.log

    Filesize

    8KB

    MD5

    07bf45a8cb0a1bcce881be63ffb645d6

    SHA1

    ab474b815884d5826bcca02fa25bc719ae8d87da

    SHA256

    111a37b8873be1d4d681b701a52463a2968fc0511c4eff051b6ee3c4220b61c9

    SHA512

    949b514c810a4a7c051e4bf174736ca83cc88c33e8dabff48cd1071ccbb01f9005c354bfbbd2aa827ea09b6fdb8c9ade41cf88cd002bd9d392decf622dfa7b35

  • C:\Windows\Logs\DPX\setupact.log

    Filesize

    9KB

    MD5

    0a54afceee09013832bc561fe634cce8

    SHA1

    c734362ab158a2c140622a9c29d864feff17c391

    SHA256

    3938c959c9b7ff96756c1e9fe80c458adfc5b8019885bc369dd5070496eca878

    SHA512

    617f5424de900c9072d6ca98276c2c0b075e014952725e0ca41eed37ae80b7e6f890b7fdb9d2f38fe2363b85f996b9327e19fa79480f0b7db92d4ab30d80f1f0

  • \??\c:\users\admin\appdata\local\temp\code\crc32.sec.zip

    Filesize

    29KB

    MD5

    9f79488a0f0832ba5621385bcdbe051e

    SHA1

    7464579e2ba57ffcbb54018141beadb3a075f244

    SHA256

    5c91cc63de571e770ba733fdfa3028544060085323733fce23201385016e5edf

    SHA512

    e8cb7ded1f169bf9c1c3fe408a1d7c2bbb5e6ef6351a9044830b2508cb70cfdb2546ab0f0ee38b731a1a3d046587ad04769c72d92cb0c53cfe07a61a79512881

  • \??\c:\users\admin\appdata\local\temp\inc\gui.inc.zip

    Filesize

    3KB

    MD5

    198419d819d8746e075c7c6dd4cc53ae

    SHA1

    abb10e479deb20ed13c153a241b8b9b70ad2fac2

    SHA256

    1f4d749d507f68ab6d970704dfffbcfc5d7a26f080adfe0541bfa5dda4b42669

    SHA512

    3057edd296a87a5b795a1190d6b7d849061d1e0075f5fd323de123e8229d039fe99b142ec30f7fb565b2f44aab2b235d1129872254f9a21e8c4283d35e3b2c6d

  • \??\c:\users\admin\appdata\local\temp\inc\lib\gdi32.lib.zip

    Filesize

    58KB

    MD5

    54860c094c7e7a8379665548641462d0

    SHA1

    9f1eaad74a62875d308f2a947946b756281210a9

    SHA256

    04b147dad1441b40fd76f6e2b6be5942bea7846740f0ed4f0cb307e032cb004c

    SHA512

    325793327e6137f8467e91e2f9a294ca3356e0885421cf8a9d2098bcddfd09af31a217de5c7a628d5f038aeb82dc9f4f68b9dd12cffcb12b2a763188926f40a6

  • \??\c:\users\admin\appdata\local\temp\sec.exe.zip

    Filesize

    93KB

    MD5

    4abd64e89f08637f7b5a09e664d5022f

    SHA1

    f0fb5640cbae362da5df7250d3b1fdf1f2c1f99e

    SHA256

    099681aa51fdd7bff43d36ad495e23e1403cfbb51869ca97b536a87fba8eb11c

    SHA512

    e5c7f749c4ae6d1282a224b2781f7a9e702fbbbdc8de150aa2042ee974d7f34f57cc99a0e6a10e363fbec2b69ab9a19037d2cb21ec181d49872d9e78eb4b173d

  • \??\c:\users\admin\appdata\local\temp\sec.ini.zip

    Filesize

    68KB

    MD5

    d501cd96aaba0649aacf8e36f4d23618

    SHA1

    ed87bf5ab1ffc115f82431ca82706e114742a572

    SHA256

    c5f4f979127e973f333b15b8bee09fa97125e25501aad7f2ad69568bd77e6d0d

    SHA512

    4a319ef1dc00f09a4566c324a318e87174fa96d6a322f59f4896db8048934236837493bf82abb1e8e45aacf2d4fb513c94daa2a1152b2a2bf6189dfa3834065e

  • \??\c:\users\admin\appdata\local\temp\sec1.exe.zip

    Filesize

    79KB

    MD5

    d085984d31845ee1481453980cb27330

    SHA1

    c807bf7fe564d8b0ce6c443fe5b03b74e849ed33

    SHA256

    80c2c7bba4315f170997d4f8fa4a977951dd3ca80ec0fcc7a8425d8eb429ce89

    SHA512

    31022f557c57aff90a86d3bc5f55ed71226b8d08f1bfb1b8d93b206f2e91883747653d813d5660b1dd1c99cd80af25d5e97e5242a680582e6021bffd5893895c

  • \??\c:\users\admin\appdata\local\temp\uplog.txt.zip

    Filesize

    9KB

    MD5

    3899bb128e5b294440bb8eecbcf5ac14

    SHA1

    a00b56c237e40ab7885bf694d98496de5623317c

    SHA256

    fae642716dfca375674fc5cae925f8156c0b65f1d146877525ebdff69fcdad02

    SHA512

    02f67ef5b9c8788dbaded76ed2b76680beed49cfb3c51ac2248ab4c1b266a66cba662e66fcfa8359c8a7e087f4f546215d7356ac32416d19acd05cdb281f7661

  • \Users\Admin\AppData\Local\Temp\Sec.exe

    Filesize

    108KB

    MD5

    dfa1023dace7cf6736ca42933f143761

    SHA1

    780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

    SHA256

    722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

    SHA512

    26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

  • \Users\Admin\AppData\Local\Temp\Sec.exe

    Filesize

    108KB

    MD5

    dfa1023dace7cf6736ca42933f143761

    SHA1

    780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

    SHA256

    722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

    SHA512

    26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

  • memory/272-322-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/272-299-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/272-311-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/1976-313-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1976-298-0x00000000038A0000-0x00000000038ED000-memory.dmp

    Filesize

    308KB

  • memory/1976-303-0x00000000038A0000-0x00000000038ED000-memory.dmp

    Filesize

    308KB

  • memory/1976-87-0x0000000002640000-0x0000000002650000-memory.dmp

    Filesize

    64KB

  • memory/1976-55-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1976-72-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1976-58-0x0000000002640000-0x0000000002650000-memory.dmp

    Filesize

    64KB

  • memory/1976-54-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1976-314-0x0000000002640000-0x0000000002646000-memory.dmp

    Filesize

    24KB