Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    35s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2023, 15:30

General

  • Target

    EPS_setup.exe

  • Size

    4.3MB

  • MD5

    3d0b02cad726d1a45a3f55bcf395b210

  • SHA1

    cb2239ee9f5e6652ce7e54f49d667874312161a3

  • SHA256

    b18a540f4506ae9400bbc58fb8b69028274b3ccc4851de605df77b545c7c625b

  • SHA512

    f21c530547c161405d72c518e2849db299bd6e625758a83095c8b5a894f1287861693a0f2ba76593558d7160ad539f3273ff842f259e3fb886dbfa4abc4a90f1

  • SSDEEP

    49152:GqeNVSZPSLIkg/JFF85w8pLe0xgcMw10EDl0qO7wv3My+B2sO2skryk9ReN/xj:3EsPSLIlM5w8Rbdr0SI723My+AsGkCr

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EPS_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\EPS_setup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\is-0AE4E.tmp\EPS_setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0AE4E.tmp\EPS_setup.tmp" /SL5="$50156,3714644,795648,C:\Users\Admin\AppData\Local\Temp\EPS_setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Program Files (x86)\Didsoft\Elite Proxy Switcher\EPS.exe
        "C:\Program Files (x86)\Didsoft\Elite Proxy Switcher\EPS.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Modifies system certificate store
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Didsoft\Elite Proxy Switcher\EPS.exe

    Filesize

    574KB

    MD5

    b6ae1db2233568d6571fe949125b0bab

    SHA1

    e75eb96b5d30014a83e9dde43334d4b78494a3e3

    SHA256

    fbc65fe373c16600ac9becea7158b1e73fb49047b8922feee8f9b1f1250d4d07

    SHA512

    64076c815a4509c7b9ecd6c789470d0ee7c49034f71a61cf6f61c4796b04c7a213562dfb32c1a30eff0a0a087dc2bd52070c69a8ce88d2816eb2e80c566f37b5

  • C:\Program Files (x86)\Didsoft\Elite Proxy Switcher\EPS.exe

    Filesize

    574KB

    MD5

    b6ae1db2233568d6571fe949125b0bab

    SHA1

    e75eb96b5d30014a83e9dde43334d4b78494a3e3

    SHA256

    fbc65fe373c16600ac9becea7158b1e73fb49047b8922feee8f9b1f1250d4d07

    SHA512

    64076c815a4509c7b9ecd6c789470d0ee7c49034f71a61cf6f61c4796b04c7a213562dfb32c1a30eff0a0a087dc2bd52070c69a8ce88d2816eb2e80c566f37b5

  • C:\Program Files (x86)\Didsoft\Elite Proxy Switcher\EPS.exe

    Filesize

    574KB

    MD5

    b6ae1db2233568d6571fe949125b0bab

    SHA1

    e75eb96b5d30014a83e9dde43334d4b78494a3e3

    SHA256

    fbc65fe373c16600ac9becea7158b1e73fb49047b8922feee8f9b1f1250d4d07

    SHA512

    64076c815a4509c7b9ecd6c789470d0ee7c49034f71a61cf6f61c4796b04c7a213562dfb32c1a30eff0a0a087dc2bd52070c69a8ce88d2816eb2e80c566f37b5

  • C:\Program Files (x86)\Didsoft\Elite Proxy Switcher\MSVCP100.dll

    Filesize

    411KB

    MD5

    bc83108b18756547013ed443b8cdb31b

    SHA1

    79bcaad3714433e01c7f153b05b781f8d7cb318d

    SHA256

    b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

    SHA512

    6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

  • C:\Program Files (x86)\Didsoft\Elite Proxy Switcher\MSVCR100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Program Files (x86)\Didsoft\Elite Proxy Switcher\mfc100.dll

    Filesize

    4.2MB

    MD5

    493fc0f59054a6f4f3775655fb55295c

    SHA1

    2afe4f5eb626fb5c5aa5bb6c2bc61c88e37cf42f

    SHA256

    cac58c98f7e587ba1b2a4f41874764b59bdf6cb684a4a44aee93f91b3b9a019b

    SHA512

    9da41078a65a6b8c731388ccf4ce2a988705305f29f0841039b96cd2649f82e8ea219f082de184826e39f0edaa4a1d9aff2e60ebb8d27771222d0c7cb165598d

  • C:\Program Files (x86)\Didsoft\Elite Proxy Switcher\unins000.exe

    Filesize

    2.5MB

    MD5

    4dd95bdea5d7f374b64b81d7fd5121a5

    SHA1

    19915c376b37662184e55422040e20f4121f3f7f

    SHA256

    7aff0c5d9017ecea08f9a9b169f5e50551d4a8aac0681c9c49a251e1339c8bce

    SHA512

    055d72412132421b21eb30e4da3463209cf6b1aad3f51aa9966a584e677e3e13cfbe993eeb9f79959e6c8a9529c9940cb379308e931374f1f950372956be6deb

  • C:\ProgramData\EPS\EPS_Setting.ini

    Filesize

    345B

    MD5

    20392dd491583ea5b8e676336d65b5bc

    SHA1

    6746fd0856cce70fb5df8c4bcda1b87004610b63

    SHA256

    81d1add43d768cc45aeb4f2cf67370bff113dcd9d712269587fcb99cc9679130

    SHA512

    86ff8c96038125957e4ed3b41e775d3a467d64dc32f6712a78ff3c3541de343e12e620407cf73a032b389efb82072853bec3cb5d60e9074b3cb428272cd82ec5

  • C:\ProgramData\EPS\list.dat

    Filesize

    36B

    MD5

    989a825ecaa519865ea39c9c2591e42e

    SHA1

    774a0f4425d0c00423d499270fe372ea5167b0bd

    SHA256

    3be0afa28ced01a026e5e84b99afd332a808da3ab079448f8ffe6ee3ab4a042b

    SHA512

    b8e5750c7b07fe81d7f35d40b0ca11825b1270c65adccddf93b2e02172eaf77c20a34635a405cb6aa6ebbb460ee2d95b56d75ce0cfc334649db1b7a89a5af328

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9bd2e9586cb65b04d45c12cbc6b5713

    SHA1

    da4042cb0eae49856d28b2ac3b5ccee31bfedaf2

    SHA256

    919137d833dc2f58f4c56aece1ee0136977933991fe229c8f57ddbba02ba163e

    SHA512

    179da06a629e720926ab604d4dae8770dde44e98de539931a3a59144797e3c6e828c653ca7187815a4148aad4b429c2bae18a2bb0a2eb2d2d77b63d2ad3a1f08

  • C:\Users\Admin\AppData\Local\Temp\CabC91B.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarC97C.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\is-0AE4E.tmp\EPS_setup.tmp

    Filesize

    2.5MB

    MD5

    4dd95bdea5d7f374b64b81d7fd5121a5

    SHA1

    19915c376b37662184e55422040e20f4121f3f7f

    SHA256

    7aff0c5d9017ecea08f9a9b169f5e50551d4a8aac0681c9c49a251e1339c8bce

    SHA512

    055d72412132421b21eb30e4da3463209cf6b1aad3f51aa9966a584e677e3e13cfbe993eeb9f79959e6c8a9529c9940cb379308e931374f1f950372956be6deb

  • C:\Users\Admin\AppData\Local\Temp\is-0AE4E.tmp\EPS_setup.tmp

    Filesize

    2.5MB

    MD5

    4dd95bdea5d7f374b64b81d7fd5121a5

    SHA1

    19915c376b37662184e55422040e20f4121f3f7f

    SHA256

    7aff0c5d9017ecea08f9a9b169f5e50551d4a8aac0681c9c49a251e1339c8bce

    SHA512

    055d72412132421b21eb30e4da3463209cf6b1aad3f51aa9966a584e677e3e13cfbe993eeb9f79959e6c8a9529c9940cb379308e931374f1f950372956be6deb

  • \Program Files (x86)\Didsoft\Elite Proxy Switcher\EPS.exe

    Filesize

    574KB

    MD5

    b6ae1db2233568d6571fe949125b0bab

    SHA1

    e75eb96b5d30014a83e9dde43334d4b78494a3e3

    SHA256

    fbc65fe373c16600ac9becea7158b1e73fb49047b8922feee8f9b1f1250d4d07

    SHA512

    64076c815a4509c7b9ecd6c789470d0ee7c49034f71a61cf6f61c4796b04c7a213562dfb32c1a30eff0a0a087dc2bd52070c69a8ce88d2816eb2e80c566f37b5

  • \Program Files (x86)\Didsoft\Elite Proxy Switcher\EPS.exe

    Filesize

    574KB

    MD5

    b6ae1db2233568d6571fe949125b0bab

    SHA1

    e75eb96b5d30014a83e9dde43334d4b78494a3e3

    SHA256

    fbc65fe373c16600ac9becea7158b1e73fb49047b8922feee8f9b1f1250d4d07

    SHA512

    64076c815a4509c7b9ecd6c789470d0ee7c49034f71a61cf6f61c4796b04c7a213562dfb32c1a30eff0a0a087dc2bd52070c69a8ce88d2816eb2e80c566f37b5

  • \Program Files (x86)\Didsoft\Elite Proxy Switcher\mfc100.dll

    Filesize

    4.2MB

    MD5

    493fc0f59054a6f4f3775655fb55295c

    SHA1

    2afe4f5eb626fb5c5aa5bb6c2bc61c88e37cf42f

    SHA256

    cac58c98f7e587ba1b2a4f41874764b59bdf6cb684a4a44aee93f91b3b9a019b

    SHA512

    9da41078a65a6b8c731388ccf4ce2a988705305f29f0841039b96cd2649f82e8ea219f082de184826e39f0edaa4a1d9aff2e60ebb8d27771222d0c7cb165598d

  • \Program Files (x86)\Didsoft\Elite Proxy Switcher\msvcp100.dll

    Filesize

    411KB

    MD5

    bc83108b18756547013ed443b8cdb31b

    SHA1

    79bcaad3714433e01c7f153b05b781f8d7cb318d

    SHA256

    b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671

    SHA512

    6e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011

  • \Program Files (x86)\Didsoft\Elite Proxy Switcher\msvcr100.dll

    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • \Program Files (x86)\Didsoft\Elite Proxy Switcher\unins000.exe

    Filesize

    2.5MB

    MD5

    4dd95bdea5d7f374b64b81d7fd5121a5

    SHA1

    19915c376b37662184e55422040e20f4121f3f7f

    SHA256

    7aff0c5d9017ecea08f9a9b169f5e50551d4a8aac0681c9c49a251e1339c8bce

    SHA512

    055d72412132421b21eb30e4da3463209cf6b1aad3f51aa9966a584e677e3e13cfbe993eeb9f79959e6c8a9529c9940cb379308e931374f1f950372956be6deb

  • \Users\Admin\AppData\Local\Temp\is-0AE4E.tmp\EPS_setup.tmp

    Filesize

    2.5MB

    MD5

    4dd95bdea5d7f374b64b81d7fd5121a5

    SHA1

    19915c376b37662184e55422040e20f4121f3f7f

    SHA256

    7aff0c5d9017ecea08f9a9b169f5e50551d4a8aac0681c9c49a251e1339c8bce

    SHA512

    055d72412132421b21eb30e4da3463209cf6b1aad3f51aa9966a584e677e3e13cfbe993eeb9f79959e6c8a9529c9940cb379308e931374f1f950372956be6deb

  • memory/2232-1-0x0000000000400000-0x00000000004D0000-memory.dmp

    Filesize

    832KB

  • memory/2232-70-0x0000000000400000-0x00000000004D0000-memory.dmp

    Filesize

    832KB

  • memory/2232-10-0x0000000000400000-0x00000000004D0000-memory.dmp

    Filesize

    832KB

  • memory/3000-12-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3000-69-0x0000000000400000-0x0000000000686000-memory.dmp

    Filesize

    2.5MB

  • memory/3000-8-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3000-55-0x0000000000400000-0x0000000000686000-memory.dmp

    Filesize

    2.5MB

  • memory/3000-11-0x0000000000400000-0x0000000000686000-memory.dmp

    Filesize

    2.5MB