Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2023, 09:30

General

  • Target

    f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe

  • Size

    8.6MB

  • MD5

    a378f5d7d56928ec15bb25107f443aea

  • SHA1

    122b0c9ae0cf2df86dfb896aa3f3ad5c9e56f1e1

  • SHA256

    f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6

  • SHA512

    eac32641951ea569fd00351f0a6d37540bc80e52e614e8e521da534bdcdc59d7a925627f427cc1b4e2bd4ff584d79006fca4fe11964312ecd71a10aebaae9d19

  • SSDEEP

    196608:h4jEtzK9D8QHi06mRmv385adFfkrnxsjhVN9R3zRWe/pkzILbCSrO:h4jN8QH/JRm856FkjKNjjMeRNjK

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Detects Pyinstaller 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe
    "C:\Users\Admin\AppData\Local\Temp\f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\system32\cmd.exe
      cmd.exe /c set
      2⤵
        PID:1192
      • C:\Users\Admin\AppData\Local\Temp\f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe
        PECMD**pecmd-cmd* PUTF -dd -skipb=1047552 -len=8002926 "C:\Users\Admin\AppData\Local\Temp\~3046160588133267903.tmp",,C:\Users\Admin\AppData\Local\Temp\f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2628
      • C:\Users\Admin\AppData\Local\Temp\~3006496123174828635~\sg.tmp
        7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~3046160588133267903.tmp" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~2595610233742511668"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2648
      • C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe
        "C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe
          "C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3064

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-file-l1-2-0.dll

      Filesize

      18KB

      MD5

      9d8413744097196f92327f632a85acee

      SHA1

      dfc07f5e5a0634dd1f15fdc9ff9731748fbff919

      SHA256

      6878d8168d5cc159efe58f14e5ba10310d99b53ab8495521e54c966994dac50b

      SHA512

      a8f6e9ee1c5d65f68b8b20d406d3e666c186e15cb3b92575257b5637fe7dd5ac7d75e9ad51c839ba4490512f68f6b48822fc9edd316dd7625d3627d3b975fb2a

    • C:\Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-file-l2-1-0.dll

      Filesize

      18KB

      MD5

      361c6bcfcea263749419b0fbed7a0ce8

      SHA1

      03db13108ce9d5fc01cecf3199619ffbccbd855a

      SHA256

      b74aefd6fa638be3f415165c8109121a2093597421101abc312ee7ffa1130278

      SHA512

      aa8b585000cc65f9841b938e4523d91d8f6db650e0b4bb11efd740c27309bf81cdb77f05d0beda2489bf26f4fbc6d02c93ce3b64946502e2c044eea89696cc76

    • C:\Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      21KB

      MD5

      b402ed77d6f31d825bda175dbc0c4f92

      SHA1

      1f2a4b8753b3aae225feac5487cc0011b73c0eb7

      SHA256

      6ed17fb3ca5156b39fbc1ef7d1eefa95e739857607de4cd8d41cecfcd1350705

      SHA512

      ec04013139f3fd9dbf22b92121d82b2eb97e136f8619790cde2d0b660280e838962f9006d3e4c3a359627b017f2b6ade7edff3bbc26e559c3de37540585602d9

    • C:\Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      19KB

      MD5

      3d872be898581f00d0310d7ab9abaf2b

      SHA1

      420e0ab98bb748723130de414f0ffed117ef3f7e

      SHA256

      4de821884cbef4182b29d8c33cfe13e43e130ad58ee1281679e8d40a2edcb8ea

      SHA512

      35cfb9888a5f4299403a0d9c57f0ba79e3625431a9acc5e04ae2ae101b3dc521a0dcff5d4a1bf508b25dbf05dd432f6987d860ff494d15538ed95673a8b7376b

    • C:\Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      18KB

      MD5

      6c180c8de3ecf27de7a5812ff055737e

      SHA1

      3aad20b71bb374bb2c5f7431a1b75b60956a01fd

      SHA256

      630466fd77ac7009c947a8370a0d0c20652169824c54ddcb8c05e8df45e23197

      SHA512

      e4aa79eb2b6b3be9b545e8cb8b43cd6052036dc5cce7077be40441b9942931b30d76c475d550a178d4e94c9c366cabc852f500e482b7fdcd361fc2a08e41c00e

    • C:\Users\Admin\AppData\Local\Temp\_MEI28482\python312.dll

      Filesize

      6.6MB

      MD5

      5c5602cda7ab8418420f223366fff5db

      SHA1

      52f81ee0aef9b6906f7751fd2bbd4953e3f3b798

      SHA256

      e7890e38256f04ee0b55ac5276bbf3ac61392c3a3ce150bb5497b709803e17ce

      SHA512

      51c3b4f29781bb52c137ddb356e1bc5a37f3a25f0ed7d89416b14ed994121f884cb3e40ccdbb211a8989e3bd137b8df8b28e232f98de8f35b03965cfce4b424f

    • C:\Users\Admin\AppData\Local\Temp\_MEI28482\ucrtbase.dll

      Filesize

      1000KB

      MD5

      3c72fc810602812d8c03c8709519f115

      SHA1

      8956f79d95fe1eab1a06c4ad75588a49c2029994

      SHA256

      da572f7c674178ba7b91f7d47643fed07f7e71dbb4aeb46e1671ce08d1b31d73

      SHA512

      633f71aa2985e30870a3408dfb5b135b75c65ac89df24dc21b4f1057a6c8a489309ebdb263b3c46b054817dd81cde33ba47aa4677ee7f52237a5e0b821417901

    • C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe

      Filesize

      7.8MB

      MD5

      ed8f2fce558eb997ed22acf6e96b4fdd

      SHA1

      1f9618777746aee117d214389d6cf2f51af96f3a

      SHA256

      eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128

      SHA512

      8a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa

    • C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe

      Filesize

      7.8MB

      MD5

      ed8f2fce558eb997ed22acf6e96b4fdd

      SHA1

      1f9618777746aee117d214389d6cf2f51af96f3a

      SHA256

      eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128

      SHA512

      8a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa

    • C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe

      Filesize

      7.8MB

      MD5

      ed8f2fce558eb997ed22acf6e96b4fdd

      SHA1

      1f9618777746aee117d214389d6cf2f51af96f3a

      SHA256

      eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128

      SHA512

      8a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa

    • C:\Users\Admin\AppData\Local\Temp\~3006496123174828635~\sg.tmp

      Filesize

      715KB

      MD5

      7c4718943bd3f66ebdb47ccca72c7b1e

      SHA1

      f9edfaa7adb8fa528b2e61b2b251f18da10a6969

      SHA256

      4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc

      SHA512

      e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

    • C:\Users\Admin\AppData\Local\Temp\~3046160588133267903.tmp

      Filesize

      7.6MB

      MD5

      d264507f4b1870e1199e9696254754e2

      SHA1

      58bbdf3be331c307ab6156e9bf079620d204715a

      SHA256

      32c627cbd5dc4644f0f41e293cca1470c81cb929413b342c4da94dd64687d1b0

      SHA512

      7a907d4a057ef312487c6cba99bcae89aee7345933dce498c66ebc936007941919cfce262f782be7abe9d76fecd0ee7898077ca754dbcc17bdf3c5776f1e8ce4

    • C:\Users\Admin\AppData\Local\Temp\~3046160588133267903.tmp

      Filesize

      7.6MB

      MD5

      d264507f4b1870e1199e9696254754e2

      SHA1

      58bbdf3be331c307ab6156e9bf079620d204715a

      SHA256

      32c627cbd5dc4644f0f41e293cca1470c81cb929413b342c4da94dd64687d1b0

      SHA512

      7a907d4a057ef312487c6cba99bcae89aee7345933dce498c66ebc936007941919cfce262f782be7abe9d76fecd0ee7898077ca754dbcc17bdf3c5776f1e8ce4

    • \Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-file-l1-2-0.dll

      Filesize

      18KB

      MD5

      9d8413744097196f92327f632a85acee

      SHA1

      dfc07f5e5a0634dd1f15fdc9ff9731748fbff919

      SHA256

      6878d8168d5cc159efe58f14e5ba10310d99b53ab8495521e54c966994dac50b

      SHA512

      a8f6e9ee1c5d65f68b8b20d406d3e666c186e15cb3b92575257b5637fe7dd5ac7d75e9ad51c839ba4490512f68f6b48822fc9edd316dd7625d3627d3b975fb2a

    • \Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-file-l2-1-0.dll

      Filesize

      18KB

      MD5

      361c6bcfcea263749419b0fbed7a0ce8

      SHA1

      03db13108ce9d5fc01cecf3199619ffbccbd855a

      SHA256

      b74aefd6fa638be3f415165c8109121a2093597421101abc312ee7ffa1130278

      SHA512

      aa8b585000cc65f9841b938e4523d91d8f6db650e0b4bb11efd740c27309bf81cdb77f05d0beda2489bf26f4fbc6d02c93ce3b64946502e2c044eea89696cc76

    • \Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      21KB

      MD5

      b402ed77d6f31d825bda175dbc0c4f92

      SHA1

      1f2a4b8753b3aae225feac5487cc0011b73c0eb7

      SHA256

      6ed17fb3ca5156b39fbc1ef7d1eefa95e739857607de4cd8d41cecfcd1350705

      SHA512

      ec04013139f3fd9dbf22b92121d82b2eb97e136f8619790cde2d0b660280e838962f9006d3e4c3a359627b017f2b6ade7edff3bbc26e559c3de37540585602d9

    • \Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      19KB

      MD5

      3d872be898581f00d0310d7ab9abaf2b

      SHA1

      420e0ab98bb748723130de414f0ffed117ef3f7e

      SHA256

      4de821884cbef4182b29d8c33cfe13e43e130ad58ee1281679e8d40a2edcb8ea

      SHA512

      35cfb9888a5f4299403a0d9c57f0ba79e3625431a9acc5e04ae2ae101b3dc521a0dcff5d4a1bf508b25dbf05dd432f6987d860ff494d15538ed95673a8b7376b

    • \Users\Admin\AppData\Local\Temp\_MEI28482\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      18KB

      MD5

      6c180c8de3ecf27de7a5812ff055737e

      SHA1

      3aad20b71bb374bb2c5f7431a1b75b60956a01fd

      SHA256

      630466fd77ac7009c947a8370a0d0c20652169824c54ddcb8c05e8df45e23197

      SHA512

      e4aa79eb2b6b3be9b545e8cb8b43cd6052036dc5cce7077be40441b9942931b30d76c475d550a178d4e94c9c366cabc852f500e482b7fdcd361fc2a08e41c00e

    • \Users\Admin\AppData\Local\Temp\_MEI28482\python312.dll

      Filesize

      6.6MB

      MD5

      5c5602cda7ab8418420f223366fff5db

      SHA1

      52f81ee0aef9b6906f7751fd2bbd4953e3f3b798

      SHA256

      e7890e38256f04ee0b55ac5276bbf3ac61392c3a3ce150bb5497b709803e17ce

      SHA512

      51c3b4f29781bb52c137ddb356e1bc5a37f3a25f0ed7d89416b14ed994121f884cb3e40ccdbb211a8989e3bd137b8df8b28e232f98de8f35b03965cfce4b424f

    • \Users\Admin\AppData\Local\Temp\_MEI28482\ucrtbase.dll

      Filesize

      1000KB

      MD5

      3c72fc810602812d8c03c8709519f115

      SHA1

      8956f79d95fe1eab1a06c4ad75588a49c2029994

      SHA256

      da572f7c674178ba7b91f7d47643fed07f7e71dbb4aeb46e1671ce08d1b31d73

      SHA512

      633f71aa2985e30870a3408dfb5b135b75c65ac89df24dc21b4f1057a6c8a489309ebdb263b3c46b054817dd81cde33ba47aa4677ee7f52237a5e0b821417901

    • \Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe

      Filesize

      7.8MB

      MD5

      ed8f2fce558eb997ed22acf6e96b4fdd

      SHA1

      1f9618777746aee117d214389d6cf2f51af96f3a

      SHA256

      eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128

      SHA512

      8a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa

    • \Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe

      Filesize

      7.8MB

      MD5

      ed8f2fce558eb997ed22acf6e96b4fdd

      SHA1

      1f9618777746aee117d214389d6cf2f51af96f3a

      SHA256

      eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128

      SHA512

      8a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa

    • \Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe

      Filesize

      7.8MB

      MD5

      ed8f2fce558eb997ed22acf6e96b4fdd

      SHA1

      1f9618777746aee117d214389d6cf2f51af96f3a

      SHA256

      eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128

      SHA512

      8a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa

    • \Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe

      Filesize

      7.8MB

      MD5

      ed8f2fce558eb997ed22acf6e96b4fdd

      SHA1

      1f9618777746aee117d214389d6cf2f51af96f3a

      SHA256

      eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128

      SHA512

      8a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa

    • \Users\Admin\AppData\Local\Temp\~3006496123174828635~\sg.tmp

      Filesize

      715KB

      MD5

      7c4718943bd3f66ebdb47ccca72c7b1e

      SHA1

      f9edfaa7adb8fa528b2e61b2b251f18da10a6969

      SHA256

      4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc

      SHA512

      e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

    • memory/2188-7-0x0000000002710000-0x0000000002875000-memory.dmp

      Filesize

      1.4MB

    • memory/2188-0-0x0000000000400000-0x0000000000565000-memory.dmp

      Filesize

      1.4MB

    • memory/2188-144-0x0000000000400000-0x0000000000565000-memory.dmp

      Filesize

      1.4MB

    • memory/2628-9-0x0000000000400000-0x0000000000565000-memory.dmp

      Filesize

      1.4MB