Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    173s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    14/11/2023, 18:59

General

  • Target

    214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe

  • Size

    1.3MB

  • MD5

    bf08b2b016613d90c4ac0295c6b75fdf

  • SHA1

    841a8902ec5b7c41758d4e1d78d9527a67fe471d

  • SHA256

    214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d

  • SHA512

    845e00ee2737a2811b877a801a9e5a74daf5fef29efc54f9bed11bc416f93a9fb1cc066def7ce952128a866377358dba5193d399b66cf672b8108fcd719b8442

  • SSDEEP

    6144:p3ue8ySm8hQAAIfFrRXuEE+0l97mKwKRqHVqlWo86JQPDHDdx/Qtqa:z/zkFF+EExZmKbRuVqlWoPJQPDHvd

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 28 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe
    "C:\Users\Admin\AppData\Local\Temp\214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\xjqvein.exe
      "C:\Users\Admin\AppData\Local\Temp\xjqvein.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • System policy modification
      PID:2652
    • C:\Users\Admin\AppData\Local\Temp\xjqvein.exe
      "C:\Users\Admin\AppData\Local\Temp\xjqvein.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\xjqvein.exe

    Filesize

    2.1MB

    MD5

    5192ae431ba87dadd295fb54be12d07a

    SHA1

    977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715

    SHA256

    35ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f

    SHA512

    81e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d

  • C:\Users\Admin\AppData\Local\Temp\xjqvein.exe

    Filesize

    2.1MB

    MD5

    5192ae431ba87dadd295fb54be12d07a

    SHA1

    977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715

    SHA256

    35ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f

    SHA512

    81e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d

  • C:\Users\Admin\AppData\Local\Temp\xjqvein.exe

    Filesize

    2.1MB

    MD5

    5192ae431ba87dadd295fb54be12d07a

    SHA1

    977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715

    SHA256

    35ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f

    SHA512

    81e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d

  • C:\Users\Admin\AppData\Local\affdfcazczfrkguqjnaffd.caz

    Filesize

    272B

    MD5

    8d33928481e3a6dc00a6fbd77ba86d00

    SHA1

    06f9c99baca2b28143e2afafb2485c126e438a3e

    SHA256

    1cc907f0f374998a58162be8ef9cad601db8870ce3b18f6fca0452087481f3e1

    SHA512

    e1fb9bf728b4635911746aec74ea5cff2e4fd6fb05260cf03687d9e938b9dc2cc54d12bfbb38bd12d27ac61ca36223f850ab8d7006e5f0b139ce31e6276ee008

  • C:\Users\Admin\AppData\Local\rhsbowfpdlczdkjqujhxiremvftbsptaz.kzx

    Filesize

    3KB

    MD5

    e2583579c97e4cf4c66025a24ff2eb94

    SHA1

    3bd2e76108a527a6f91090ba9e4cd48b3d8a045a

    SHA256

    11b0763756b0add09ec1e3511dee344a8bce8334c34ca2aa64a8f1e87ef97756

    SHA512

    979820185d7af1ce7624e337bfe107f8d34c99ac2e28accd1c669e22f02c20f6a89260a0b022fbbb9e8c0c75c928210c14084ec088aa707fcb7a5b44fb2cf36a

  • \Users\Admin\AppData\Local\Temp\xjqvein.exe

    Filesize

    2.1MB

    MD5

    5192ae431ba87dadd295fb54be12d07a

    SHA1

    977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715

    SHA256

    35ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f

    SHA512

    81e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d

  • \Users\Admin\AppData\Local\Temp\xjqvein.exe

    Filesize

    2.1MB

    MD5

    5192ae431ba87dadd295fb54be12d07a

    SHA1

    977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715

    SHA256

    35ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f

    SHA512

    81e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d

  • \Users\Admin\AppData\Local\Temp\xjqvein.exe

    Filesize

    2.1MB

    MD5

    5192ae431ba87dadd295fb54be12d07a

    SHA1

    977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715

    SHA256

    35ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f

    SHA512

    81e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d

  • \Users\Admin\AppData\Local\Temp\xjqvein.exe

    Filesize

    2.1MB

    MD5

    5192ae431ba87dadd295fb54be12d07a

    SHA1

    977f8e6c052ab2fa9fb19fe49ec8e2163c4e5715

    SHA256

    35ba6bb0af42cdd3b09dc8a17c97665584314fdd79897e01d0660bcac40c004f

    SHA512

    81e491b68bdd19f1ab1f553bd812515cd47f1dd51982a3d88c52c1d88a140cbbc1693dc28eeefb2183119badfb58a45aae510b0e086f6279e72cb4f38a95e76d