Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2023, 14:32

General

  • Target

    mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe

  • Size

    1.0MB

  • MD5

    dd3ff103d7709467ac1390ab02eaca2c

  • SHA1

    3020916fc4f7e073abb12333bfe32d9f1da85181

  • SHA256

    b9ce9d101438ef819a5ac844f4ce4cd54f15686ae8cc47c3d2e669d275129d20

  • SHA512

    222a66a69848dbf5273614ef81eebd71aa11b4b0ef93c544edcb198a13869583d07f95f0bd25dd7f7efae018ebf20f4ca2551c86fce6daf5851e396bb66adef0

  • SSDEEP

    24576:qPQRqBbikTHaaS3imkNQo1mLw+N4HtSzxGp1XCStb6ZDK:vpoHar3BMQoEBu6UpNtoDK

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe
    "C:\Users\Admin\AppData\Local\Temp\mini-KMS_Activator_v1.1_Office.2010.VL.RUS.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\A3ED.tmp\Start.cmd" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Users\Admin\AppData\Local\Temp\A3ED.tmp\autorun.exe
        autorun.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A3ED.tmp\Start.cmd

    Filesize

    51B

    MD5

    5dbf6f6f2093d14dd0d2bdb71a333eb0

    SHA1

    b81f0ffb620d6fe38958706f2c62fdeb816c5bb6

    SHA256

    2c0434dbfb7befba658ccb67be2643484b76a49dadc26a3cbe7ffc3c6e2ec5da

    SHA512

    05ba55f8070ffde23755dae6139e22b340744e2c6fe268d6bd5582d4f02a49f5bd9f934b650244b1e7b120a84f507293afef5dec98a0ce274a6035b06fff0410

  • C:\Users\Admin\AppData\Local\Temp\A3ED.tmp\Start.cmd

    Filesize

    51B

    MD5

    5dbf6f6f2093d14dd0d2bdb71a333eb0

    SHA1

    b81f0ffb620d6fe38958706f2c62fdeb816c5bb6

    SHA256

    2c0434dbfb7befba658ccb67be2643484b76a49dadc26a3cbe7ffc3c6e2ec5da

    SHA512

    05ba55f8070ffde23755dae6139e22b340744e2c6fe268d6bd5582d4f02a49f5bd9f934b650244b1e7b120a84f507293afef5dec98a0ce274a6035b06fff0410

  • C:\Users\Admin\AppData\Local\Temp\A3ED.tmp\autorun.apm

    Filesize

    193KB

    MD5

    8e5f16c13b8f2c57b441bb942b8512a8

    SHA1

    c9e0aa4781a0d0c58c575ce0cc58f6961df95f27

    SHA256

    7f81c2104e5230c6c0618339d682e9803f9d26c58d1b7551525684515161b921

    SHA512

    bbdfb7c249643ee6b03c2aa9b4a405f59e5ced725420140fd7120d9ef107f85e89d9693df850f9abfe5166ac85f0218abfa4f412801884e755ee95fe29bcad4a

  • C:\Users\Admin\AppData\Local\Temp\A3ED.tmp\autorun.exe

    Filesize

    1.4MB

    MD5

    9756dc84dd17e58c4b4aaba3279364d3

    SHA1

    d363c8527c6e98adfa1baaecfa0b5928cf4ccb30

    SHA256

    0fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc

    SHA512

    f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d

  • C:\Users\Admin\AppData\Local\Temp\A3ED.tmp\autorun.exe

    Filesize

    1.4MB

    MD5

    9756dc84dd17e58c4b4aaba3279364d3

    SHA1

    d363c8527c6e98adfa1baaecfa0b5928cf4ccb30

    SHA256

    0fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc

    SHA512

    f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d

  • \Users\Admin\AppData\Local\Temp\A3ED.tmp\autorun.exe

    Filesize

    1.4MB

    MD5

    9756dc84dd17e58c4b4aaba3279364d3

    SHA1

    d363c8527c6e98adfa1baaecfa0b5928cf4ccb30

    SHA256

    0fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc

    SHA512

    f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d

  • \Users\Admin\AppData\Local\Temp\A3ED.tmp\autorun.exe

    Filesize

    1.4MB

    MD5

    9756dc84dd17e58c4b4aaba3279364d3

    SHA1

    d363c8527c6e98adfa1baaecfa0b5928cf4ccb30

    SHA256

    0fce14a187aae773ce1a30e331aad0b36ea5d1b830e450f81eb7e9f4899ee9cc

    SHA512

    f6e412f257fa470ba284cb98590a1b340ce3afa739275230f8a960341775ccc3337e79a79788416c17ebc8db7d2959a6193d1fa321b219e6562c02ea4c57a56d

  • \Users\Admin\AppData\Local\Temp\apmAA63.tmp

    Filesize

    146KB

    MD5

    3d4839228c7ee77e28832879eeb17340

    SHA1

    ebe4a6388c8c6831837e232b48b8f4266b7f711e

    SHA256

    5d6ff8a11cda6d5b1e6d8a5562594379a082cee18f402a8a0a26b8cabe428954

    SHA512

    f3c534524eaa4b51ee44a6c1d05a142c0d10d9c1c48db79b60903dd948d5712b367479b82cd85fa8ee094dcd2569c0fd85a36c10c97deab59e49e1f1f4da6c56

  • memory/1128-0-0x0000000000400000-0x0000000000669000-memory.dmp

    Filesize

    2.4MB

  • memory/1128-80-0x0000000000400000-0x0000000000669000-memory.dmp

    Filesize

    2.4MB

  • memory/2524-68-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2524-72-0x0000000010000000-0x000000001007E000-memory.dmp

    Filesize

    504KB

  • memory/2524-82-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2524-83-0x0000000000400000-0x00000000005B1000-memory.dmp

    Filesize

    1.7MB