Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 06:47

General

  • Target

    84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c.exe

  • Size

    536KB

  • MD5

    74bcc42a4bb2f206d76f562d21bb2284

  • SHA1

    355dbb36f5088ba5ebd2fb2e84f2ff2f4cfa46eb

  • SHA256

    84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c

  • SHA512

    43a42aefe9f79e1f5a5983f0e9aea87b388a293322ad9701ffef99aa93759ac8d1a94a921dc6f0cee96b3fd3ef10d9cde4fd3569b04480fd7c6568401025e02e

  • SSDEEP

    12288:xhf0Bs9bDDq9huzJgIJzgXaEw9Stu/aB9a/Okx2LIa:xdQyDLzJTveuK0/Okx2LF

Score
10/10
upx

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 11 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:424
      • C:\Windows\Logs\unregmp2.exe
        "C:\Windows\Logs\unregmp2.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2740
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c.exe
        "C:\Users\Admin\AppData\Local\Temp\84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\84d72b8fd291a03e3abe63e37f18ac9fe3c7328574d889aeb09019e1d661b54c.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:3036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab4607.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar61E3.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\a1832ac7.tmp

      Filesize

      14.5MB

      MD5

      6697f78c0dffa2e0b851046aaf272101

      SHA1

      b91aeb9e6d4d99778a4fe27da2457cdb321e8bfe

      SHA256

      354b9545fbb292faea96eadbef7c85caf0f6f72b915e567044833fdfc2b923f0

      SHA512

      fd5d44c6aa0c791e77bfec1436e810b1ef6cd1c92937faa060b6688b5dd4a47268189639e628e2fed8ce57ad04b0e816f18b16d2a3e69e60cbd16049948766d4

    • C:\Windows\Logs\unregmp2.exe

      Filesize

      316KB

      MD5

      64b328d52dfc8cda123093e3f6e4c37c

      SHA1

      f68f45b21b911906f3aa982e64504e662a92e5ab

      SHA256

      7d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1

      SHA512

      e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00

    • \Windows\Logs\unregmp2.exe

      Filesize

      316KB

      MD5

      64b328d52dfc8cda123093e3f6e4c37c

      SHA1

      f68f45b21b911906f3aa982e64504e662a92e5ab

      SHA256

      7d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1

      SHA512

      e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00

    • memory/424-71-0x0000000000970000-0x0000000000998000-memory.dmp

      Filesize

      160KB

    • memory/424-70-0x0000000000970000-0x0000000000998000-memory.dmp

      Filesize

      160KB

    • memory/424-61-0x0000000000820000-0x0000000000841000-memory.dmp

      Filesize

      132KB

    • memory/1260-143-0x000007FEF5570000-0x000007FEF56B3000-memory.dmp

      Filesize

      1.3MB

    • memory/1260-35-0x0000000003DB0000-0x0000000003DB3000-memory.dmp

      Filesize

      12KB

    • memory/1260-32-0x0000000003DB0000-0x0000000003DB3000-memory.dmp

      Filesize

      12KB

    • memory/1260-39-0x0000000008910000-0x0000000008A09000-memory.dmp

      Filesize

      996KB

    • memory/1260-26-0x0000000003BE0000-0x0000000003BE1000-memory.dmp

      Filesize

      4KB

    • memory/1260-142-0x000007FEB0C60000-0x000007FEB0C6A000-memory.dmp

      Filesize

      40KB

    • memory/1260-24-0x00000000074B0000-0x00000000075A4000-memory.dmp

      Filesize

      976KB

    • memory/1260-54-0x0000000003CA0000-0x0000000003D19000-memory.dmp

      Filesize

      484KB

    • memory/1260-141-0x000007FEF5570000-0x000007FEF56B3000-memory.dmp

      Filesize

      1.3MB

    • memory/1260-4-0x0000000002B20000-0x0000000002B23000-memory.dmp

      Filesize

      12KB

    • memory/1260-7-0x0000000002B20000-0x0000000002B23000-memory.dmp

      Filesize

      12KB

    • memory/1260-6-0x0000000003CA0000-0x0000000003D19000-memory.dmp

      Filesize

      484KB

    • memory/1260-3-0x0000000002B20000-0x0000000002B23000-memory.dmp

      Filesize

      12KB

    • memory/1924-37-0x0000000000BA0000-0x0000000000CA2000-memory.dmp

      Filesize

      1.0MB

    • memory/1924-72-0x0000000000BA0000-0x0000000000CA2000-memory.dmp

      Filesize

      1.0MB

    • memory/1924-0-0x0000000000BA0000-0x0000000000CA2000-memory.dmp

      Filesize

      1.0MB

    • memory/2740-129-0x00000000045B0000-0x0000000004775000-memory.dmp

      Filesize

      1.8MB

    • memory/2740-130-0x00000000045B0000-0x0000000004775000-memory.dmp

      Filesize

      1.8MB

    • memory/2740-123-0x0000000000970000-0x0000000000998000-memory.dmp

      Filesize

      160KB

    • memory/2740-124-0x00000000003C0000-0x000000000048B000-memory.dmp

      Filesize

      812KB

    • memory/2740-126-0x00000000020C0000-0x00000000020CA000-memory.dmp

      Filesize

      40KB

    • memory/2740-125-0x00000000020C0000-0x00000000020C1000-memory.dmp

      Filesize

      4KB

    • memory/2740-127-0x00000000020C0000-0x00000000020CA000-memory.dmp

      Filesize

      40KB

    • memory/2740-128-0x00000000020C0000-0x00000000020CA000-memory.dmp

      Filesize

      40KB

    • memory/2740-120-0x0000000036F30000-0x0000000036F40000-memory.dmp

      Filesize

      64KB

    • memory/2740-122-0x00000000003C0000-0x000000000048B000-memory.dmp

      Filesize

      812KB

    • memory/2740-131-0x00000000020C0000-0x00000000020C1000-memory.dmp

      Filesize

      4KB

    • memory/2740-132-0x00000000020D0000-0x00000000020D1000-memory.dmp

      Filesize

      4KB

    • memory/2740-133-0x00000000020D0000-0x00000000020D1000-memory.dmp

      Filesize

      4KB

    • memory/2740-134-0x00000000045B0000-0x0000000004775000-memory.dmp

      Filesize

      1.8MB

    • memory/2740-58-0x00000000003C0000-0x000000000048B000-memory.dmp

      Filesize

      812KB

    • memory/2740-55-0x00000000003C0000-0x000000000048B000-memory.dmp

      Filesize

      812KB

    • memory/2740-42-0x0000000000060000-0x0000000000123000-memory.dmp

      Filesize

      780KB

    • memory/2740-59-0x000007FEBEB40000-0x000007FEBEB50000-memory.dmp

      Filesize

      64KB