Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    40s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2023, 19:53 UTC

General

  • Target

    dControl.exe

  • Size

    447KB

  • MD5

    58008524a6473bdf86c1040a9a9e39c3

  • SHA1

    cb704d2e8df80fd3500a5b817966dc262d80ddb8

  • SHA256

    1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326

  • SHA512

    8cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31

  • SSDEEP

    6144:Vzv+kSn74iCmfianQGDM3OXTWRDy9GYQDUmJFXIXHrsUBnBTF8JJCYrYNsQJzfgu:Vzcn7EanlQiWtYhmJFSwUBLcQZfgiD

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 4 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dControl.exe
    "C:\Users\Admin\AppData\Local\Temp\dControl.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\dControl.exe
      C:\Users\Admin\AppData\Local\Temp\dControl.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
      • C:\Users\Admin\AppData\Local\Temp\dControl.exe
        "C:\Users\Admin\AppData\Local\Temp\dControl.exe" /TI
        3⤵
        • Modifies security service
        • Windows security modification
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2212
  • C:\Windows\system32\makecab.exe
    "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231009195339.log C:\Windows\Logs\CBS\CbsPersist_20231009195339.cab
    1⤵
    • Drops file in Windows directory
    PID:1628
  • C:\Windows\system32\gpscript.exe
    gpscript.exe /RefreshSystemParam
    1⤵
      PID:1728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2n8c2d4i.tmp

      Filesize

      37KB

      MD5

      3bc9acd9c4b8384fb7ce6c08db87df6d

      SHA1

      936c93e3a01d5ae30d05711a97bbf3dfa5e0921f

      SHA256

      a3d7de3d70c7673e8af7275eede44c1596156b6503a9614c47bad2c8e5fa3f79

      SHA512

      f8508376d9fb001bce10a8cc56da5c67b31ff220afd01fb57e736e961f3a563731e84d6a6c046123e1a5c16d31f39d9b07528b64a8f432eac7baa433e1d23375

    • C:\Users\Admin\AppData\Local\Temp\dControl.ini

      Filesize

      2KB

      MD5

      c6298cea5708758b7961a6d047260606

      SHA1

      e01611420801a87226d8d3dbeaae71bd5182dad9

      SHA256

      65512285a7ea190a218c91f48ffde0b3b577db116d4f598942e5e870856f0a9a

      SHA512

      801489b00ac8b14de6aef3fd4e342caec8c95fb0a3dbabfec642545a77d4db406006a525423b0b8f400ad75be5f574de6926e30f34da0d217982e76644f980ec

    • C:\Windows\System32\GroupPolicy\gpt.ini

      Filesize

      233B

      MD5

      cd4326a6fd01cd3ca77cfd8d0f53821b

      SHA1

      a1030414d1f8e5d5a6e89d5a309921b8920856f9

      SHA256

      1c59482111e657ef5190e22de6c047609a67e46e28d67fd70829882fd8087a9c

      SHA512

      29ce5532fb3adf55caa011e53736507fbf241afee9d3ca516a1d9bffec6e5cb2f87c4cd73e4da8c33b8706f96ba3b31f13ce229746110d5bd248839f67ec6d67

    • C:\Windows\Temp\aut87A7.tmp

      Filesize

      14KB

      MD5

      9d5a0ef18cc4bb492930582064c5330f

      SHA1

      2ec4168fd3c5ea9f2b0ab6acd676a5b4a95848c8

      SHA256

      8f5bbcc572bc62feb13a669f856d21886a61888fd6288afd066272a27ea79bb3

      SHA512

      1dc3387790b051c3291692607312819f0967848961bc075799b5a2353efadd65f54db54ddf47c296bb6a9f48e94ec83086a4f8bf7200c64329a73fc7ec4340a4

    • C:\Windows\Temp\aut87B7.tmp

      Filesize

      12KB

      MD5

      efe44d9f6e4426a05e39f99ad407d3e7

      SHA1

      637c531222ee6a56780a7fdcd2b5078467b6e036

      SHA256

      5ea3b26c6b1b71edaef17ce365d50be963ae9f4cb79b39ec723fe6e9e4054366

      SHA512

      8014b60cef62ff5c94bf6338ee3385962cfc62aaa6c101a607c592ba00aea2d860f52e5f52be2a2a3b35310f135548e8d0b00211bfcf32d6b71198f5d3046b63

    • C:\Windows\Temp\aut87B8.tmp

      Filesize

      7KB

      MD5

      ecffd3e81c5f2e3c62bcdc122442b5f2

      SHA1

      d41567acbbb0107361c6ee1715fe41b416663f40

      SHA256

      9874ab363b07dcc7e9cd6022a380a64102c1814343642295239a9f120cb941c5

      SHA512

      7f84899b77e3e2c0a35fb4973f4cd57f170f7a22f862b08f01938cf7537c8af7c442ef2ae6e561739023f6c9928f93a59b50d463af6373ed344f68260bc47c76

    • memory/2212-98-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    • memory/2212-44-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    • memory/2212-94-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    • memory/2212-95-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    • memory/2212-108-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    • memory/2212-109-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    • memory/2736-43-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    • memory/2736-21-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    • memory/2824-0-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    • memory/2824-22-0x0000000000400000-0x00000000004CD000-memory.dmp

      Filesize

      820KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.