Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2023, 19:21

General

  • Target

    6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe

  • Size

    12.6MB

  • MD5

    311d9e31d3a7596ddf1f870dd531834d

  • SHA1

    ba53764381cc32354b94aa4c6bbc0396a2bec11e

  • SHA256

    6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644

  • SHA512

    5eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6

  • SSDEEP

    196608:EJYTgM7tWqt/06024m7zoxrCwrV0l51J2tyj02fii1J4zSlYYvHSPus/d:rTiV2p7zoxrTCJJx02fp4WuGsV

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe
    "C:\Users\Admin\AppData\Local\Temp\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe
      C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe
        "C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe" d
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Users\Admin\AppData\Local\Temp\rar_dqpekb.exe
          C:\Users\Admin\AppData\Local\Temp\rar_dqpekb.exe msg_pyzduo.jpg
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1696
        • C:\Users\Admin\AppData\Local\Temp\rar_zknjkz.exe
          C:\Users\Admin\AppData\Local\Temp\rar_zknjkz.exe msg_gmtdaq.jpg
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1d8f320f64cb4ce5959bd27dbe4f0431.txt

    Filesize

    12B

    MD5

    5b5b91cc5219fd60f8b779c4e67427e7

    SHA1

    a063e36f069729ba085b5f1059c7f3807efd6446

    SHA256

    fc8386617e87699bc3d99b196f189b5d6edc3971f828ef9dff974493da249f4a

    SHA512

    5d1ce7a2e39d8bedc7c53a3a1ec178cdf5754d848feb16b6354e4586f4cd0a0ce9e5c3032283b6b7a01f8d9b357ae73dab1f9beee88325ef4fa8c16a182fba20

  • C:\Users\Admin\AppData\Local\Temp\93c6cde56957801783dee5d3630466c2.ini

    Filesize

    5KB

    MD5

    6ef81088e338683845d2ba716f87f282

    SHA1

    769ac4f0d57b79a909fc769b3abf45aa1374b37b

    SHA256

    893b2b12e9902c13020fdca100931b1cf24ff031b246a85d56e5f77c1028d652

    SHA512

    4b3d6cb5e80d4fa095aa95a188fb394da65e711e0c65629f51668247ac4ac53253641e904bed747ffb6b29f094cd84ef5b6741181cc6b7f170e030f4876f9862

  • C:\Users\Admin\AppData\Local\Temp\93c6cde56957801783dee5d3630466c2.ini

    Filesize

    393B

    MD5

    c832ebbeafe5f3dd2ae508c2136c2eb5

    SHA1

    4683e9645343dd838a388653b73ef5efa46bdde6

    SHA256

    8d3410be77cf103957d6062cea3cabdc5828787d9a2c542d049d3b50ff06c501

    SHA512

    e4ba0356f6837e64819dfd2b2e42bddc1ca2f4742ea4a45bf1e1b774fa668bf4f5c70b70905cdd436c44738d913f3a9973ee663300b9e406f1b0ffcbfeeb54a5

  • C:\Users\Admin\AppData\Local\Temp\del.dat

    Filesize

    102B

    MD5

    b7e0f2ebca8ed87020a6f1bd7aa824ec

    SHA1

    8d8e6affbfc37b2bbe320717151e8f6072376f78

    SHA256

    451591daf16728bafa4f6437723322fb9af0a15f55cc3e9c15b51d39562a2512

    SHA512

    19900b56152c77bc557f33172499c762b887d54f54c45c20ba24a77fac4d712da16f320f7334f777c7352f35086e20d358132d8e9c006c20bcd3c382602ab4db

  • C:\Users\Admin\AppData\Local\Temp\msg_gmtdaq.jpg

    Filesize

    402KB

    MD5

    b526c779625f4e073f7cd695beab26a0

    SHA1

    2c9af45c9b154968c21d92aa461e7ee4b8c90af3

    SHA256

    62d33a207ee917a99a135049afe9b7252c42445b777fc5fcc2f3ce8858604b63

    SHA512

    99a2f2939d8dd0da85839a71eae33197566891358f466f1e2d2d2b1fcebe4f4f7957a441eda08cbf5bc03f115b0b0b6136cf6ad346cf5895d18abb510761e4f0

  • C:\Users\Admin\AppData\Local\Temp\msg_pyzduo.jpg

    Filesize

    402KB

    MD5

    b526c779625f4e073f7cd695beab26a0

    SHA1

    2c9af45c9b154968c21d92aa461e7ee4b8c90af3

    SHA256

    62d33a207ee917a99a135049afe9b7252c42445b777fc5fcc2f3ce8858604b63

    SHA512

    99a2f2939d8dd0da85839a71eae33197566891358f466f1e2d2d2b1fcebe4f4f7957a441eda08cbf5bc03f115b0b0b6136cf6ad346cf5895d18abb510761e4f0

  • C:\Users\Admin\AppData\Local\Temp\rar_dqpekb.exe

    Filesize

    184KB

    MD5

    5088a9c819d48f39cba2f321da0daa2b

    SHA1

    a685b428fb97416985e728a32048476ce79b9f85

    SHA256

    0815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9

    SHA512

    91979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e

  • C:\Users\Admin\AppData\Local\Temp\rar_zknjkz.exe

    Filesize

    184KB

    MD5

    5088a9c819d48f39cba2f321da0daa2b

    SHA1

    a685b428fb97416985e728a32048476ce79b9f85

    SHA256

    0815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9

    SHA512

    91979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e

  • C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe

    Filesize

    12.6MB

    MD5

    311d9e31d3a7596ddf1f870dd531834d

    SHA1

    ba53764381cc32354b94aa4c6bbc0396a2bec11e

    SHA256

    6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644

    SHA512

    5eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6

  • C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe

    Filesize

    12.6MB

    MD5

    311d9e31d3a7596ddf1f870dd531834d

    SHA1

    ba53764381cc32354b94aa4c6bbc0396a2bec11e

    SHA256

    6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644

    SHA512

    5eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6

  • C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe

    Filesize

    12.6MB

    MD5

    311d9e31d3a7596ddf1f870dd531834d

    SHA1

    ba53764381cc32354b94aa4c6bbc0396a2bec11e

    SHA256

    6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644

    SHA512

    5eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6

  • C:\ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe

    Filesize

    12.6MB

    MD5

    311d9e31d3a7596ddf1f870dd531834d

    SHA1

    ba53764381cc32354b94aa4c6bbc0396a2bec11e

    SHA256

    6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644

    SHA512

    5eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6

  • \Users\Admin\AppData\Local\Temp\rar_dqpekb.exe

    Filesize

    184KB

    MD5

    5088a9c819d48f39cba2f321da0daa2b

    SHA1

    a685b428fb97416985e728a32048476ce79b9f85

    SHA256

    0815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9

    SHA512

    91979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e

  • \Users\Admin\AppData\Local\Temp\rar_dqpekb.exe

    Filesize

    184KB

    MD5

    5088a9c819d48f39cba2f321da0daa2b

    SHA1

    a685b428fb97416985e728a32048476ce79b9f85

    SHA256

    0815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9

    SHA512

    91979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e

  • \Users\Admin\AppData\Local\Temp\rar_zknjkz.exe

    Filesize

    184KB

    MD5

    5088a9c819d48f39cba2f321da0daa2b

    SHA1

    a685b428fb97416985e728a32048476ce79b9f85

    SHA256

    0815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9

    SHA512

    91979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e

  • \Users\Admin\AppData\Local\Temp\rar_zknjkz.exe

    Filesize

    184KB

    MD5

    5088a9c819d48f39cba2f321da0daa2b

    SHA1

    a685b428fb97416985e728a32048476ce79b9f85

    SHA256

    0815a68dfeb1aaa1027f9201111907d2d87efe3826ba6318a7699c702e84fff9

    SHA512

    91979b941482c2bdd6414957807cb559a676fa433ed3b41668a08a4a68195069789c095b2fd29eeb800ef158481d9ec16165bfd4a73624904c0757672585996e

  • \ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe

    Filesize

    12.6MB

    MD5

    311d9e31d3a7596ddf1f870dd531834d

    SHA1

    ba53764381cc32354b94aa4c6bbc0396a2bec11e

    SHA256

    6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644

    SHA512

    5eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6

  • \ÁúÈË´«Ëµ\6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644.exe

    Filesize

    12.6MB

    MD5

    311d9e31d3a7596ddf1f870dd531834d

    SHA1

    ba53764381cc32354b94aa4c6bbc0396a2bec11e

    SHA256

    6b198ef17c5b52b52cb68f437c9e8238a0d225239279837176ef54b646ea7644

    SHA512

    5eb269ee2a2fd19676e45989e299913ccfafc23895df943f4a6758fb026adf19a267bdda38ff442515e84398e35fdb6fdbb7f2ff301e4b33a5122318bb7bd1e6

  • memory/1236-224-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/1236-248-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-225-0x0000000000020000-0x0000000000023000-memory.dmp

    Filesize

    12KB

  • memory/1236-228-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/1236-311-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/1236-299-0x0000000000A70000-0x0000000000B70000-memory.dmp

    Filesize

    1024KB

  • memory/1236-298-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/1236-238-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-240-0x0000000000A70000-0x0000000000B70000-memory.dmp

    Filesize

    1024KB

  • memory/1236-239-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-241-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-242-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-243-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-244-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-245-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-246-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-247-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-294-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-249-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-251-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-252-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-253-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-254-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-256-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-257-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-259-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-261-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-262-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-263-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-264-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-297-0x0000000000020000-0x0000000000023000-memory.dmp

    Filesize

    12KB

  • memory/1236-296-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-269-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1236-270-0x0000000003630000-0x00000000036CD000-memory.dmp

    Filesize

    628KB

  • memory/1696-279-0x0000000180000000-0x000000018001B000-memory.dmp

    Filesize

    108KB

  • memory/2168-77-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-315-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-340-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-339-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-318-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-317-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-75-0x0000000000020000-0x0000000000023000-memory.dmp

    Filesize

    12KB

  • memory/2168-316-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-314-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-237-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-234-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-300-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-302-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-304-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-306-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-308-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-78-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2168-313-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2220-54-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2220-71-0x0000000005B70000-0x00000000060DD000-memory.dmp

    Filesize

    5.4MB

  • memory/2220-76-0x0000000000020000-0x0000000000023000-memory.dmp

    Filesize

    12KB

  • memory/2220-58-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2220-74-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2220-55-0x0000000000020000-0x0000000000023000-memory.dmp

    Filesize

    12KB

  • memory/2220-59-0x0000000000400000-0x000000000096D000-memory.dmp

    Filesize

    5.4MB

  • memory/2220-70-0x0000000005B70000-0x00000000060DD000-memory.dmp

    Filesize

    5.4MB