Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    14/11/2023, 18:51

General

  • Target

    acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe

  • Size

    853KB

  • MD5

    dbf67f7f28604cab1644c0f6b7964a96

  • SHA1

    5e787962936e37a00826a4edae473e1cc8e7ace7

  • SHA256

    acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d

  • SHA512

    5675c7a947fce4cfb0d2601274a1691daa892996d5f5c52e15f6042d8aeda40f35d275a85c4d39bed1a29c20d45da36777064d3304eb294e8109c217681dce89

  • SSDEEP

    24576:/ifxgP1zXgMG1kT0Gqgr1iuXXABG8L4Yfs:6fxgP18rOvqgrZHj8LJs

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
    "C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
      C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • System policy modification
      PID:1404
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2508
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:2496

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabDBB1.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\TarDBE3.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe

      Filesize

      853KB

      MD5

      9a63fbce74c2aacb02a46937e770daef

      SHA1

      d74c3db12bdf0bb896fb6a90a9dc2834a3e89075

      SHA256

      0cf4b178bf176907926c70816f9e4ffddec70c1d9fa6f6a941a6cff98908954a

      SHA512

      603cc278ef83b533c6063eea058c79544445073f1aa7f3276cbcfb86510f1887762db2ecaee4c71fb17162a8ceb45f3f5b8914f0a7b2794e0fa8c749dc7ffc04

    • \Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe

      Filesize

      853KB

      MD5

      9a63fbce74c2aacb02a46937e770daef

      SHA1

      d74c3db12bdf0bb896fb6a90a9dc2834a3e89075

      SHA256

      0cf4b178bf176907926c70816f9e4ffddec70c1d9fa6f6a941a6cff98908954a

      SHA512

      603cc278ef83b533c6063eea058c79544445073f1aa7f3276cbcfb86510f1887762db2ecaee4c71fb17162a8ceb45f3f5b8914f0a7b2794e0fa8c749dc7ffc04

    • memory/1404-12-0x0000000000340000-0x00000000003B2000-memory.dmp

      Filesize

      456KB

    • memory/1404-10-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/1404-19-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1404-11-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1404-60-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/2508-62-0x0000000004140000-0x0000000004141000-memory.dmp

      Filesize

      4KB

    • memory/2508-63-0x0000000004140000-0x0000000004141000-memory.dmp

      Filesize

      4KB

    • memory/2868-1-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2868-8-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB