Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 22:54

General

  • Target

    8a0ea6a29cc498dbc97625855f03b3a7af515ed2e8b2ef6c030f97a77882272e.exe

  • Size

    5.0MB

  • MD5

    4ad2b416a2b5f600c3e716330cf9f693

  • SHA1

    88c02803c0de2d01ca92c1b672c103ed916d80d2

  • SHA256

    8a0ea6a29cc498dbc97625855f03b3a7af515ed2e8b2ef6c030f97a77882272e

  • SHA512

    c166c65709c2fafd0b23bda7f7ced363533a384a6a6d7c4280628e91e82f229c020d24e08ed4497b0072bcda01695dc333f47d7104d85a68d5a9c62d5828498f

  • SSDEEP

    98304:Rk7ny2H8ajH2YqdwkLcHHZHYDS84GJBAUZL3Dd:R+dWjAW0GJVjDd

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a0ea6a29cc498dbc97625855f03b3a7af515ed2e8b2ef6c030f97a77882272e.exe
    "C:\Users\Admin\AppData\Local\Temp\8a0ea6a29cc498dbc97625855f03b3a7af515ed2e8b2ef6c030f97a77882272e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\·ÀÉÁÍË.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\SysWOW64\sc.exe
        sc delete ChromeElevationService
        3⤵
        • Launches sc.exe
        PID:2352
      • C:\Windows\SysWOW64\sc.exe
        sc delete 360
        3⤵
        • Launches sc.exe
        PID:2832
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /t /im dllhost.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2656
      • C:\Windows\SysWOW64\reg.exe
        REG DELETE HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\360 /f
        3⤵
          PID:2568
        • C:\Windows\SysWOW64\reg.exe
          REG DELETE HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\360 /f
          3⤵
            PID:2616
          • C:\Windows\SysWOW64\reg.exe
            REG DELETE HKEY_LOCAL_MACHINE\SYSTEM\ControlSet\Services\360 /f
            3⤵
              PID:2916
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" https://zcmao.lanzouh.com/iDDDe1bgj0xg
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2920
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:2
              3⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2040

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          252B

          MD5

          597f988cc0658f6810419daa63898644

          SHA1

          aef50c1ea414c8adf0555afea05626ba642dd540

          SHA256

          2370144c222b11dd1ef8b2f6472b54ee90927ea68cc514d1d0614ab1cf077d21

          SHA512

          1ba4fe864229adfd812c0d0b202cf2f3a063caf107e4d032820fd58f3a98383fc312452bc422db99326c71c4fa37506c4a34766907b9ab250b9acb4c5f07e3d1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          968afce9f20d07fecc31805d7a64f0c2

          SHA1

          cf4b0c8879949002663f0a8ea457a84dc348058d

          SHA256

          9bb990654438dc76d9dba2e1c07f88454493c955877dd803fc5e0f2fdf31634b

          SHA512

          1c066104079ca59cd276d0ce2361f0b9728b2bd28e453c10a7f60cd46bfe8db03086de0ae48c04dc3f4395cb08026d0c3092b5cdc53a5d66558c876b9019b26b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          37095fa3006891f304a32580980d1ae1

          SHA1

          6916bbfd1ddc3da0c5810b58bcc4150fa2b07dbf

          SHA256

          a5fdd2dac0bed5271149b7601f026b3f27d4ce9361bf2e7b08ad2c1bbf39dbb7

          SHA512

          ca4a14cb1f807aaf8b8dcb47b0c7cd8acfbd42a833bc28286b19a408f550b9cc99f3d0ed3100f31f3dca1bf718925a3a8f59bc2a371e34c2acd60c81e5f5993d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          dd07a1b441ea8b8dfb942b7fec7873f1

          SHA1

          f2e4edd10a4465b411531870050520d698dbdf67

          SHA256

          24af7f32f0fc76283034d53a0007ca0526551e3cd85b84cbe8615274c4dacaf5

          SHA512

          91e16b9b1b8cb14a9dcb6797d905201184bc45b847d52bf5b98aac344fb054361a56d6065747ff504ebef504651fb804add2f3acec4a4a05a0908382aaea574b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          08e28aaa9f8df123aa24fbffbd7220a2

          SHA1

          e141fef0051b6a939d4c8cec0d91fab2d03f8708

          SHA256

          13484319324d6a21ba5c78c7560e5b0929f156dd6d7a4a890646607aa838fd92

          SHA512

          379ec79b99f6b65b8b973ccf3adf06ebdd79caa78fe94c04b9a476c54305086591571ec788dec3aec23be20a1ce1a1014561aaa6c16041146fbded4d1030bb8e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          57a4ace1fa5ef7dce33ecc91c9307189

          SHA1

          cdff5236b6fa992c3e1cb88143e1276aa0dfe2eb

          SHA256

          73f8e110bea9d5f3776edd5a7c5700c02b7b21586b25ae0372a140f1263ba362

          SHA512

          fba1952d99aa2ba6fb90a84e52ad1ef107f4e35c39013c77ce0ab06ac05be8e5ef12ba62b71ff9927f96d180428658e980433a06d455e7a73e5d0e1a72b5fa1d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7570ad9db1d46aa9ff7b4d6ef85c47f8

          SHA1

          507672eb24bb4779b69de1f61b8be18837e3ab62

          SHA256

          6aea5e9360e68a8edbea66ea632d7bc3ea546fee8bc37ec0d00c442b1ac16eae

          SHA512

          dba157adc374149680d76fe305d859d7773d1feefc7020570129dc6ba3229998354507dc5e36535549add4d35fc80e53628871e7b0f394590f2ccea23edead69

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2420f2ae1cddb0e7b9a28a79e1478424

          SHA1

          e93a2d69c1ebf3dc9dd71e47c38465c60812aef6

          SHA256

          858ddb8271790b6dce77014dcc86a9aec495b3c7af255f26f00a11dd9f4da59e

          SHA512

          1442dda04d1119c40c50ce191528f99e2321b9c1dc5296cf1155264d4f6fc8c85c6d268938e848d47fa1cf36a992c4bff583e380514bc9011c6ea4ecfc75a1a0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d63906bb3cfb3358735c8a3f1cc91d20

          SHA1

          0ae33069adc85810b24dea3519960fa9a31f2275

          SHA256

          0f05e189d71925269d076d76937451389c1b6fae177d7bd64c8fe293d26066b5

          SHA512

          a4533ffe0c66607d2d798c3996fc3dcb60d7f111ac621f185a626aaec6f5feeedb3ac91067e851d6057beba9af3e2880b72930adc7c4eb33985fab6d0d4eaa00

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c569aad340049c726021f7f5ea13377e

          SHA1

          d3fd53508a5baa07ab068e515b981258e1a78239

          SHA256

          5e6a4ff143f5e7f2be7ddfd9e545b7600cd910f7dd8e26821314e0874dbc8a70

          SHA512

          fe9ece516c378f2c06f734e5d3544946df7019ff5b1f79b62f1b1a1e701f9caa0681e95fdf04e120ee8071589f6f849b63cff8d3212d0f53691699eb2fe19515

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          52a024a7474f8ea070e1bf98f173c196

          SHA1

          9b21bf70166ee15af81374a309166a36689522f8

          SHA256

          12df8b71fc190b7decee7766adf224ef22aab5d598c32deaa7f1abd4284affb5

          SHA512

          5818f15b0f17cdee8a2af741b4ec86a47599b4627bb02ce432fd2b0be3e4eb8bfae3ce1bf6adc4193406504e9867bf1ebe997ee67229b14c5359e0f999ec6956

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          570803ccedc70ee69b162849bac6a0ae

          SHA1

          427c8e0968e1ea20886acb9cc5b8e47b32e94c25

          SHA256

          68423126debcfd7016d7c32192016ca4445e43973a209350c7b532d47d901c55

          SHA512

          0f2f38159fea1290ff2e6e730820de446e98795fa047ef526c7faa9c460bc4d428e8f37d893a1b1c409920e975ce7b97dc3b8de8940daaf906f2927407f54cb4

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\OE0CE6GF\zcmao.lanzouh[1].xml

          Filesize

          137B

          MD5

          e4a41d43618d89b1546d2e037516ae79

          SHA1

          0a62ace5bc98ccc5c8bd95ccc49c89ab96c555dd

          SHA256

          02c9f15d9ba6776a5c9d1471ece3b882c32b87246994c786a2bdff6439eedfd6

          SHA512

          9e75f88a95159d2c220ea6d4ccd6cb964703e218f5a8a5e056f6a418a967ad86f9612f5c7a1b9828478ce8c7bc3158e771aef2086a484f7e7108f17b9b7c01a3

        • C:\Users\Admin\AppData\Local\Temp\CabFDFE.tmp

          Filesize

          61KB

          MD5

          f3441b8572aae8801c04f3060b550443

          SHA1

          4ef0a35436125d6821831ef36c28ffaf196cda15

          SHA256

          6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

          SHA512

          5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

        • C:\Users\Admin\AppData\Local\Temp\TarFE20.tmp

          Filesize

          163KB

          MD5

          9441737383d21192400eca82fda910ec

          SHA1

          725e0d606a4fc9ba44aa8ffde65bed15e65367e4

          SHA256

          bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

          SHA512

          7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

        • C:\Users\Admin\AppData\Local\Temp\·ÀÉÁÍË.bat

          Filesize

          467B

          MD5

          f3ff51b7aa0e4e3044d31e57cd316f38

          SHA1

          de03393bddc8e3cc225766e988ec732a86be9674

          SHA256

          ea04a3da71be52f51404cabfa8eeefd12223d95f92c1f2a376ee25ee7323181b

          SHA512

          c582a9767528a4dc860ba322529b4d2b77aa8a272bb95053ace7fba671aad0aefc9aa7c7fd5682b8f875da58a4b6142ec708cb4bc40345645cc661c12ab32f21

        • C:\Users\Admin\AppData\Local\Temp\·ÀÉÁÍË.bat

          Filesize

          467B

          MD5

          f3ff51b7aa0e4e3044d31e57cd316f38

          SHA1

          de03393bddc8e3cc225766e988ec732a86be9674

          SHA256

          ea04a3da71be52f51404cabfa8eeefd12223d95f92c1f2a376ee25ee7323181b

          SHA512

          c582a9767528a4dc860ba322529b4d2b77aa8a272bb95053ace7fba671aad0aefc9aa7c7fd5682b8f875da58a4b6142ec708cb4bc40345645cc661c12ab32f21

        • memory/2768-0-0x0000000000300000-0x000000000030A000-memory.dmp

          Filesize

          40KB