Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    108s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 10:39

General

  • Target

    17cf2c1dadaaddb62b66093f9437b123031ea4e9b462fb98b15010e47c8fa78c.exe

  • Size

    6.9MB

  • MD5

    1eb3d67e7dada36d48320be287101c08

  • SHA1

    bf739d88e5af6883fa1707d02e2f5bd004ea67d2

  • SHA256

    17cf2c1dadaaddb62b66093f9437b123031ea4e9b462fb98b15010e47c8fa78c

  • SHA512

    341ec6e4674c25c287a511962f4b3aaede58f08aca5297c1624231e550ce81a36f31f81134a683453ca25321e9073cfa1435a99241e6ceaffd8cb9c43d8c2f7b

  • SSDEEP

    196608:gRW8Bq+q3WGhRQY914E1DF+V3bm/LCGNq3eUeKP3gdVfzj:gQeqbhPK4DFY4CtOUYVfzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17cf2c1dadaaddb62b66093f9437b123031ea4e9b462fb98b15010e47c8fa78c.exe
    "C:\Users\Admin\AppData\Local\Temp\17cf2c1dadaaddb62b66093f9437b123031ea4e9b462fb98b15010e47c8fa78c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\is-RTI8N.tmp\17cf2c1dadaaddb62b66093f9437b123031ea4e9b462fb98b15010e47c8fa78c.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-RTI8N.tmp\17cf2c1dadaaddb62b66093f9437b123031ea4e9b462fb98b15010e47c8fa78c.tmp" /SL5="$90062,6953145,68096,C:\Users\Admin\AppData\Local\Temp\17cf2c1dadaaddb62b66093f9437b123031ea4e9b462fb98b15010e47c8fa78c.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3992
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4800
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4364
      • C:\Program Files (x86)\WMAFormat\wmaformat.exe
        "C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4988
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:696
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:4484

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        154KB

        MD5

        5106394f76bbb6f46b821fedec862ca8

        SHA1

        e8db64e1425756976505dd030250777b5fc989d9

        SHA256

        e1b4b89d5a79819871ed2b7a546ed3400daa8ae3f9cb3512d50283d12d83790d

        SHA512

        66a1f0e7f3581967617f579bf22a017b56e1f9f8f5fcf31b9d9ed23b34197b25fcbad8c29cbe51fe14b359c81b049b34f505ce0dc9b496f0e4c8cd5e6c2b91da

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        79KB

        MD5

        4fbb31433149117f63c16f6752af100f

        SHA1

        ac87b71e0f7fac3fafd33139dce8a7093f4a7ef2

        SHA256

        70ed6fc417a433fe0b08f93c74aceaafc64237238cbea9a5b23596ad468ad086

        SHA512

        952f59d3dc01f22980d85aca345fb9dfb58dce48d69ad790f1c3e83ffcdc2a2beff3e97ad673191e41d9d02ac26c58ce1b73433fdba330061ea895901bee136a

      • C:\Program Files (x86)\WMAFormat\wmaformat.exe

        Filesize

        154KB

        MD5

        e66fddabd1c072954777105cc22dafa1

        SHA1

        2a278d868912fd9be82693bdb7b7436463976d53

        SHA256

        85474e79ff0cfcd176372f4d57bdd8a2723b0a3e3d43c6677179db24afdfb381

        SHA512

        b49884ca9eda86234dcc02a03104037e9166964b0dc16a994e096006d2a365e7df0c7d493f8412c5a3bb71a73e876398f0482bfe651eb2e56d2748e3e25262c0

      • C:\Users\Admin\AppData\Local\Temp\is-RTI8N.tmp\17cf2c1dadaaddb62b66093f9437b123031ea4e9b462fb98b15010e47c8fa78c.tmp

        Filesize

        178KB

        MD5

        ae90caad2f70e0c6c75293934e3da61b

        SHA1

        3809cb1a51f0ab41bf9b1309d431e8b2330e99c6

        SHA256

        eddecb25f34b00bb95f9aeb5a076fc1c1ca23a844a1c84f12e3a34efc7c69f78

        SHA512

        380e2201b7067ab53f6216f20716c3f6ac1001d250ee9eee3868510ffc05e56d3781d1748b9b4fd000ec3f546062d0b41364528e58b7a9f483be1fd4459384d3

      • C:\Users\Admin\AppData\Local\Temp\is-RTI8N.tmp\17cf2c1dadaaddb62b66093f9437b123031ea4e9b462fb98b15010e47c8fa78c.tmp

        Filesize

        214KB

        MD5

        d3235fec06e315f3d611fbd49b92ae99

        SHA1

        d7c726ed0e874736a9817ae4a8b2b15163d2d3b3

        SHA256

        346d9dd35d2eeb1cdacdd7db7e6265b3977c36ed24de5b6892e73ea4c4f1af01

        SHA512

        a100ec8e8a2cfeaf0190da491f154d74095bc76afa75adf6b6d399cde707749d72f424e8b219e2b203ca0068edd07154fc2e8ec4b7c120f77d6919f4894351f1

      • \Users\Admin\AppData\Local\Temp\is-P9U82.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-P9U82.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/3992-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/3992-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3992-13-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/4132-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4132-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4132-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4800-177-0x00000000007C0000-0x000000000085E000-memory.dmp

        Filesize

        632KB

      • memory/4800-189-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-208-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-159-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-157-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-162-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-205-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-167-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-166-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-170-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-173-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-176-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-182-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-183-0x00000000007C0000-0x000000000085E000-memory.dmp

        Filesize

        632KB

      • memory/4800-202-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-186-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-199-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-190-0x00000000007C0000-0x000000000085E000-memory.dmp

        Filesize

        632KB

      • memory/4800-193-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-196-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4988-151-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4988-152-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4988-155-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/4988-154-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB