Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 08:21

General

  • Target

    1df28f1053d2707721114eb417762c0d51840f948803e6a36abaf288324fab8c.exe

  • Size

    6.9MB

  • MD5

    9ae278078c8cde673ce79e591a0b439d

  • SHA1

    967e04499dd986627fea2a0e559bd2c51a7a50ae

  • SHA256

    1df28f1053d2707721114eb417762c0d51840f948803e6a36abaf288324fab8c

  • SHA512

    cd6c03b13458c85279902d6146c1c561d812ca797b8f15ef5500c06a290f151edea2a7a4f12611e784fcf323b36bbac2f0ed7800d9d6526998cbd245a32541ae

  • SSDEEP

    196608:QH/2cOhoGEpX+jRFRvz29jgM7+3Utny3r/mvZO0agzj:FcOhoGE1ArRvqlgM7xtAT0Hzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1df28f1053d2707721114eb417762c0d51840f948803e6a36abaf288324fab8c.exe
    "C:\Users\Admin\AppData\Local\Temp\1df28f1053d2707721114eb417762c0d51840f948803e6a36abaf288324fab8c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Local\Temp\is-FBVRT.tmp\1df28f1053d2707721114eb417762c0d51840f948803e6a36abaf288324fab8c.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-FBVRT.tmp\1df28f1053d2707721114eb417762c0d51840f948803e6a36abaf288324fab8c.tmp" /SL5="$4020E,6982471,68096,C:\Users\Admin\AppData\Local\Temp\1df28f1053d2707721114eb417762c0d51840f948803e6a36abaf288324fab8c.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4428
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4852
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i
        3⤵
        • Executes dropped EXE
        PID:3060
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:2496
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:4820

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        79KB

        MD5

        f28d048ebef312a591dae650776ee926

        SHA1

        2da8cf2c5505741f7395407e03e7306151d24b99

        SHA256

        cb4ca89f320dc53a04491ebee8378f909dd1b67b60605ffa31d1e2a50ce2fbf4

        SHA512

        52964cb3878f4eb3e68bf804d52052c7b90950f475cd54b8fb3000b4f2b0aa8e3e1b7a6e47acf0b8ba022b210285ba4e4af05c2bd48f5bd791619cfed9ae179d

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        61KB

        MD5

        98d343d1ad6ae58b7e18f6c788ed9755

        SHA1

        6a94bccc08907fc7d7e6ff9edd8e4b29a3f4dc05

        SHA256

        681a9e58e27bf3a772771165c2c4e498003a6302f649443312d7da57dd563779

        SHA512

        40f56f0437a1afe1be081d35a0c56cf6946ec0a6598b6362fabc63438dc9fe9a452f3db112c8f3a9b3f9df5d69e9c02a70fb64cab0e1f44556092e9466af50c1

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        35KB

        MD5

        01e506612f141d9dda67183420e54376

        SHA1

        1a1bfd5731eea3ebecf19216aaa7421a85496f21

        SHA256

        fe9f396501ffb3d1ff4733c16d7b5c661bad94a8b5495b77d878ebf7722078e9

        SHA512

        41095525547ae5412dfa72b889670a2a9d1801b6de8553baca92d70cc0f816df7bd035b87d49c2ad89008555b9fc52d81005c5ed1469e48060b06ea2c841fa9b

      • C:\Users\Admin\AppData\Local\Temp\is-FBVRT.tmp\1df28f1053d2707721114eb417762c0d51840f948803e6a36abaf288324fab8c.tmp

        Filesize

        149KB

        MD5

        dfe451f832e84558eb81c75c3e54f491

        SHA1

        d77c7e2198e7d57e928920b5fb7ae11ab23de8ed

        SHA256

        2923b317dfe81489e50f85eee44627439d2a88ccc484090efbffd2af8a8d7823

        SHA512

        2c38ea07df25cc37750d35bdf6507b9f3e9fb973991a6793c555c2b6de7520e2c604b35c52c9198e8687b985e40fea959e93901ca78d7f29a4d001df10e81335

      • C:\Users\Admin\AppData\Local\Temp\is-FBVRT.tmp\1df28f1053d2707721114eb417762c0d51840f948803e6a36abaf288324fab8c.tmp

        Filesize

        119KB

        MD5

        0f02000343ff2d99f94165c90c77b859

        SHA1

        5fffe7c808947ac670af3e9d3c79799851e13f3e

        SHA256

        7cc6004ca522c18a1717fedde271da49bf3cbe228c2223eb209a77f180ad6e55

        SHA512

        f24c5603d4f9d953df673e04b43b368c2c15e8da6ee81f5172acafb717574e57f0ed8ff36e635324b03a07fda2132088a508b09f270f0287a70e15c074d56430

      • C:\Users\Admin\AppData\Local\Temp\is-TQK7H.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-TQK7H.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/1832-159-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1832-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/1832-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3060-155-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/3060-154-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/3060-152-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/3060-150-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/3920-162-0x0000000000750000-0x0000000000751000-memory.dmp

        Filesize

        4KB

      • memory/3920-160-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3920-10-0x0000000000750000-0x0000000000751000-memory.dmp

        Filesize

        4KB

      • memory/4428-165-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-184-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-166-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-158-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-169-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-172-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-175-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-179-0x00000000025F0000-0x000000000268E000-memory.dmp

        Filesize

        632KB

      • memory/4428-178-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-161-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-187-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-188-0x00000000025F0000-0x000000000268E000-memory.dmp

        Filesize

        632KB

      • memory/4428-191-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-194-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-197-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-201-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-204-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4428-207-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB