Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/11/2023, 15:01

231102-sdwxkafe89 7

02/11/2023, 14:58

231102-scexnade9x 7

Analysis

  • max time kernel
    202s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2023, 15:01

General

  • Target

    jutting/listener/PreLoginListener.class

  • Size

    915B

  • MD5

    311c49e2c5bf69ef791262cd3b87c529

  • SHA1

    b98dedf5009706ca4cb98223a05e80244370aee4

  • SHA256

    5824be6014259d41ea2ef39921ed909ec22274adaac6b94f8b362c4f8130c77e

  • SHA512

    548f4197426e2cfe0d6c201bc413771268740d93d2d14d3718fb408142a88d60efca2eb9268ad5a02ef898e790daaa0126646d7e7559a514ba65f8a3ec5d1686

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\jutting\listener\PreLoginListener.class
    1⤵
    • Modifies registry class
    PID:3276
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3672
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:2232
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2992

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

      Filesize

      16KB

      MD5

      f47e0f14958e1152fe70c6bfb9a065f6

      SHA1

      01946accaa5f9cfee44eb12cad025a39f0b1e479

      SHA256

      af88d4fc0c0f82d53679b1eb1800894eb86ff37440f4c969e7c873d1d185bc25

      SHA512

      e8ffffad5996132aed22020ea085055212b7f4122ccd6a97b7452a863cf659ee09023b22890d1e9f4d12be2a00c71ce16c03786dd6363f11a2105effe5557c9a

    • memory/2992-40-0x0000016999310000-0x0000016999311000-memory.dmp

      Filesize

      4KB

    • memory/2992-42-0x0000016999310000-0x0000016999311000-memory.dmp

      Filesize

      4KB

    • memory/2992-33-0x0000016999300000-0x0000016999301000-memory.dmp

      Filesize

      4KB

    • memory/2992-34-0x0000016999300000-0x0000016999301000-memory.dmp

      Filesize

      4KB

    • memory/2992-35-0x0000016999300000-0x0000016999301000-memory.dmp

      Filesize

      4KB

    • memory/2992-36-0x0000016999300000-0x0000016999301000-memory.dmp

      Filesize

      4KB

    • memory/2992-37-0x0000016999300000-0x0000016999301000-memory.dmp

      Filesize

      4KB

    • memory/2992-38-0x0000016999300000-0x0000016999301000-memory.dmp

      Filesize

      4KB

    • memory/2992-39-0x0000016999300000-0x0000016999301000-memory.dmp

      Filesize

      4KB

    • memory/2992-43-0x0000016998F40000-0x0000016998F41000-memory.dmp

      Filesize

      4KB

    • memory/2992-32-0x00000169992F0000-0x00000169992F1000-memory.dmp

      Filesize

      4KB

    • memory/2992-41-0x0000016999310000-0x0000016999311000-memory.dmp

      Filesize

      4KB

    • memory/2992-0-0x0000016990C40000-0x0000016990C50000-memory.dmp

      Filesize

      64KB

    • memory/2992-44-0x0000016998F30000-0x0000016998F31000-memory.dmp

      Filesize

      4KB

    • memory/2992-46-0x0000016998F40000-0x0000016998F41000-memory.dmp

      Filesize

      4KB

    • memory/2992-49-0x0000016998F30000-0x0000016998F31000-memory.dmp

      Filesize

      4KB

    • memory/2992-52-0x0000016998E70000-0x0000016998E71000-memory.dmp

      Filesize

      4KB

    • memory/2992-16-0x0000016990D40000-0x0000016990D50000-memory.dmp

      Filesize

      64KB

    • memory/2992-64-0x0000016999070000-0x0000016999071000-memory.dmp

      Filesize

      4KB

    • memory/2992-66-0x0000016999080000-0x0000016999081000-memory.dmp

      Filesize

      4KB

    • memory/2992-67-0x0000016999080000-0x0000016999081000-memory.dmp

      Filesize

      4KB

    • memory/2992-68-0x0000016999190000-0x0000016999191000-memory.dmp

      Filesize

      4KB