Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 16:47

General

  • Target

    739a38ab9a9ff169ad806fe52affb72995ce8944d2e9a42dfd91e41bffcec316.exe

  • Size

    536KB

  • MD5

    35c62921f6d6b930053b6cbb32d48a24

  • SHA1

    15ba18d0e71a05fa47c149d9427f05c10236cd2f

  • SHA256

    739a38ab9a9ff169ad806fe52affb72995ce8944d2e9a42dfd91e41bffcec316

  • SHA512

    cb7c3ea83fb8b22fae94b2fa9e7e19cea101dd24815c2729cf2465dbe484740df75c2a9680700c0f94aa24ba37c32a40625a8252b0aaaa6a0cea2a8e82b0323c

  • SSDEEP

    12288:2Qab4j0WxHHxvgZ5Debn9XdvVYf8tn5+qqheFgOkx2LIa:Tvj0oxv2Dezv/tx3yOkx2LF

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops file in Drivers directory 9 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Drops file in Windows directory 11 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:424
      • C:\Windows\AtBroker.exe
        "C:\Windows\AtBroker.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Windows\system32\mspaint.exe
          "C:\Windows\system32\mspaint.exe"
          3⤵
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:2088
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\739a38ab9a9ff169ad806fe52affb72995ce8944d2e9a42dfd91e41bffcec316.exe
        "C:\Users\Admin\AppData\Local\Temp\739a38ab9a9ff169ad806fe52affb72995ce8944d2e9a42dfd91e41bffcec316.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2228
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\739a38ab9a9ff169ad806fe52affb72995ce8944d2e9a42dfd91e41bffcec316.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:528
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:2708
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1180

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\CabEE38.tmp

      Filesize

      29KB

      MD5

      d59a6b36c5a94916241a3ead50222b6f

      SHA1

      e274e9486d318c383bc4b9812844ba56f0cff3c6

      SHA256

      a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

      SHA512

      17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

    • C:\Users\Admin\AppData\Local\Temp\TarEE5A.tmp

      Filesize

      81KB

      MD5

      b13f51572f55a2d31ed9f266d581e9ea

      SHA1

      7eef3111b878e159e520f34410ad87adecf0ca92

      SHA256

      725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

      SHA512

      f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

    • C:\Users\Admin\AppData\Local\Temp\TarF0CE.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Windows\37NIk64f0KqSB.sys

      Filesize

      415KB

      MD5

      9a3ed61f49118554ed954814c2660946

      SHA1

      6af0670605fa88b949bd24abbd5b17e7e61b6d37

      SHA256

      8ab06902bc15dfd0a12dd53c618a1db57be45dbf4b7969631acb5f111b21a966

      SHA512

      917c2ce2d53a1ddc1e68bd6d1790dcf34105d6f4c850fe2310950d0da808a137401e1ee868fa20060977ede8af2baa260ecf4ab7f824c8531d8666821c279c54

    • C:\Windows\AtBroker.exe

      Filesize

      34KB

      MD5

      23566f9723771108d2e6cd768ac27407

      SHA1

      16ad110630ee630ac2eae687a0b75bf30e61c320

      SHA256

      fac0293dd1061b151e779bf4b245e6652c951fedebc602a166156dfbd38b5d67

      SHA512

      ead09862f4a9e9092e1c7c191d3cf40a77f082cc6177f08ce1851789fa54713f147ba826a493e1d8f69d605a70f517948192755841db8e205e7c8ca40bc27260

    • C:\Windows\AtBroker.exe

      Filesize

      34KB

      MD5

      23566f9723771108d2e6cd768ac27407

      SHA1

      16ad110630ee630ac2eae687a0b75bf30e61c320

      SHA256

      fac0293dd1061b151e779bf4b245e6652c951fedebc602a166156dfbd38b5d67

      SHA512

      ead09862f4a9e9092e1c7c191d3cf40a77f082cc6177f08ce1851789fa54713f147ba826a493e1d8f69d605a70f517948192755841db8e205e7c8ca40bc27260

    • C:\Windows\AtBroker.exe

      Filesize

      34KB

      MD5

      23566f9723771108d2e6cd768ac27407

      SHA1

      16ad110630ee630ac2eae687a0b75bf30e61c320

      SHA256

      fac0293dd1061b151e779bf4b245e6652c951fedebc602a166156dfbd38b5d67

      SHA512

      ead09862f4a9e9092e1c7c191d3cf40a77f082cc6177f08ce1851789fa54713f147ba826a493e1d8f69d605a70f517948192755841db8e205e7c8ca40bc27260

    • C:\Windows\JdEzLh6SlAz9.sys

      Filesize

      447KB

      MD5

      d805ae1e26e9068171902ff6221d0d66

      SHA1

      afdd11e40a0ac8829bddc2b63543bfde41c67844

      SHA256

      2bc45fdfb6ddbee6218adae5efa995fdc06fe5e59698a01024256215c9abb00a

      SHA512

      26c587b17e00ad94241553d23251606d13fe65451466c848f3ac204f7839ff1e9aac9c066124e41ebb1094e56240f7046260beb66a9ef026276c995efd6c4abb

    • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      4fee3a094d822dbc508dc53de73c72c5

      SHA1

      6eafd48b9008c10060217705e15b775415db62ba

      SHA256

      66e6d07900fa518494590fcca8e194e5913ca69746a91073cd478dfcc2210444

      SHA512

      5358cc56921bcc9307c7d876aede2e1355607044305cbbf4b7f1aef4b2e4f2aec6bdfc8612ffbfeae9a06a19e01732581f3b40638c9b160064a904b593e1ebb0

    • C:\Windows\b9Q2Xv7HHgV8.sys

      Filesize

      415KB

      MD5

      64bc1983743c584a9ad09dacf12792e5

      SHA1

      0f14098f523d21f11129c4df09451413ddff6d61

      SHA256

      057ec356f1577fe86b706e5aeb74e3bdd6fe04d22586fecf69b866f8f72db7f5

      SHA512

      9ab4ddb64bd97dd1a7ee15613a258edf1d2eba880a0896a91487c47a32c9bd1118cde18211053a5b081216d123d5f901b454a525cbba01d8067c31babd8c8c3c

    • C:\Windows\wDZoScteKDL.sys

      Filesize

      447KB

      MD5

      d15f5f23df8036bd5089ce8d151b0e0d

      SHA1

      4066ff4d92ae189d92fcdfb8c11a82cc9db56bb2

      SHA256

      f2c40dde6f40beaa3c283b66791ff27e6f06d66c8dd6eff5262f51e02ee26520

      SHA512

      feaec8a00346b0a74c530859785e1b280da5833bf3113083bf4664ebee85b14ceca648499f36d266d329d602349f9ad0fc21a10e605377b3a2c24b456f3a9bd9

    • memory/424-128-0x0000000000800000-0x0000000000828000-memory.dmp

      Filesize

      160KB

    • memory/424-58-0x0000000000720000-0x0000000000741000-memory.dmp

      Filesize

      132KB

    • memory/424-72-0x0000000000800000-0x0000000000828000-memory.dmp

      Filesize

      160KB

    • memory/1180-3361-0x0000000000150000-0x0000000000153000-memory.dmp

      Filesize

      12KB

    • memory/1252-3351-0x0000000008C40000-0x0000000008CEC000-memory.dmp

      Filesize

      688KB

    • memory/1252-380-0x0000000004080000-0x0000000004081000-memory.dmp

      Filesize

      4KB

    • memory/1252-242-0x0000000001F80000-0x0000000002126000-memory.dmp

      Filesize

      1.6MB

    • memory/1252-2-0x0000000002A40000-0x0000000002A43000-memory.dmp

      Filesize

      12KB

    • memory/1252-3352-0x0000000003E30000-0x0000000003E31000-memory.dmp

      Filesize

      4KB

    • memory/1252-1-0x0000000002A40000-0x0000000002A43000-memory.dmp

      Filesize

      12KB

    • memory/1252-3350-0x0000000003E10000-0x0000000003E13000-memory.dmp

      Filesize

      12KB

    • memory/1252-181-0x0000000003F90000-0x0000000003F91000-memory.dmp

      Filesize

      4KB

    • memory/1252-69-0x0000000003A50000-0x0000000003AC9000-memory.dmp

      Filesize

      484KB

    • memory/1252-36-0x0000000006ED0000-0x0000000006FC7000-memory.dmp

      Filesize

      988KB

    • memory/1252-35-0x0000000006ED0000-0x0000000006FC7000-memory.dmp

      Filesize

      988KB

    • memory/1252-23-0x0000000004D50000-0x0000000004E43000-memory.dmp

      Filesize

      972KB

    • memory/1252-31-0x0000000003F80000-0x0000000003F83000-memory.dmp

      Filesize

      12KB

    • memory/1252-25-0x0000000003F50000-0x0000000003F51000-memory.dmp

      Filesize

      4KB

    • memory/1252-5-0x0000000002A40000-0x0000000002A43000-memory.dmp

      Filesize

      12KB

    • memory/1252-122-0x0000000006ED0000-0x0000000006FC7000-memory.dmp

      Filesize

      988KB

    • memory/1252-363-0x0000000004080000-0x0000000004081000-memory.dmp

      Filesize

      4KB

    • memory/1252-166-0x0000000001F80000-0x0000000002126000-memory.dmp

      Filesize

      1.6MB

    • memory/1252-4-0x0000000003A50000-0x0000000003AC9000-memory.dmp

      Filesize

      484KB

    • memory/1252-306-0x0000000003F90000-0x0000000003F91000-memory.dmp

      Filesize

      4KB

    • memory/1252-243-0x0000000003F90000-0x0000000003F91000-memory.dmp

      Filesize

      4KB

    • memory/1252-289-0x0000000003F90000-0x0000000003F91000-memory.dmp

      Filesize

      4KB

    • memory/1252-155-0x0000000003F90000-0x0000000003F91000-memory.dmp

      Filesize

      4KB

    • memory/2088-149-0x0000000001F80000-0x0000000002126000-memory.dmp

      Filesize

      1.6MB

    • memory/2088-135-0x00000000000E0000-0x000000000027C000-memory.dmp

      Filesize

      1.6MB

    • memory/2088-239-0x0000000001F80000-0x0000000002126000-memory.dmp

      Filesize

      1.6MB

    • memory/2228-0-0x00000000011E0000-0x00000000012E2000-memory.dmp

      Filesize

      1.0MB

    • memory/2228-54-0x00000000011E0000-0x00000000012E2000-memory.dmp

      Filesize

      1.0MB

    • memory/2228-71-0x00000000011E0000-0x00000000012E2000-memory.dmp

      Filesize

      1.0MB

    • memory/3000-197-0x0000000001E40000-0x0000000001E6E000-memory.dmp

      Filesize

      184KB

    • memory/3000-206-0x0000000005760000-0x000000000592A000-memory.dmp

      Filesize

      1.8MB

    • memory/3000-157-0x0000000001D60000-0x0000000001D6F000-memory.dmp

      Filesize

      60KB

    • memory/3000-151-0x0000000003100000-0x00000000031B7000-memory.dmp

      Filesize

      732KB

    • memory/3000-148-0x0000000003B80000-0x0000000003C2C000-memory.dmp

      Filesize

      688KB

    • memory/3000-146-0x0000000003B80000-0x0000000003C2C000-memory.dmp

      Filesize

      688KB

    • memory/3000-136-0x0000000005760000-0x000000000592A000-memory.dmp

      Filesize

      1.8MB

    • memory/3000-134-0x0000000005760000-0x000000000592A000-memory.dmp

      Filesize

      1.8MB

    • memory/3000-133-0x0000000001E40000-0x0000000001E6E000-memory.dmp

      Filesize

      184KB

    • memory/3000-132-0x0000000001E40000-0x0000000001E6E000-memory.dmp

      Filesize

      184KB

    • memory/3000-131-0x0000000001D50000-0x0000000001D51000-memory.dmp

      Filesize

      4KB

    • memory/3000-130-0x0000000003100000-0x00000000031B7000-memory.dmp

      Filesize

      732KB

    • memory/3000-129-0x0000000001D60000-0x0000000001D6F000-memory.dmp

      Filesize

      60KB

    • memory/3000-126-0x0000000001D50000-0x0000000001D51000-memory.dmp

      Filesize

      4KB

    • memory/3000-127-0x0000000000440000-0x000000000050B000-memory.dmp

      Filesize

      812KB

    • memory/3000-973-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-1337-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-1458-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-1591-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-1832-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-1929-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2062-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2171-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2244-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2413-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2524-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2645-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2706-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2755-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2837-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2880-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-2950-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-3095-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-3180-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-3289-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-3338-0x0000000001D50000-0x0000000001D51000-memory.dmp

      Filesize

      4KB

    • memory/3000-3339-0x0000000001D50000-0x0000000001D51000-memory.dmp

      Filesize

      4KB

    • memory/3000-3348-0x0000000000510000-0x0000000000511000-memory.dmp

      Filesize

      4KB

    • memory/3000-125-0x0000000000800000-0x0000000000828000-memory.dmp

      Filesize

      160KB

    • memory/3000-123-0x0000000037AD0000-0x0000000037AE0000-memory.dmp

      Filesize

      64KB

    • memory/3000-56-0x000007FEBE870000-0x000007FEBE880000-memory.dmp

      Filesize

      64KB

    • memory/3000-57-0x0000000000440000-0x000000000050B000-memory.dmp

      Filesize

      812KB

    • memory/3000-53-0x0000000000440000-0x000000000050B000-memory.dmp

      Filesize

      812KB

    • memory/3000-41-0x0000000000150000-0x0000000000213000-memory.dmp

      Filesize

      780KB