Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 16:45

General

  • Target

    8c8a299a1d072e928796937381976c2acba7268bbfbd638dcceb651d40e4d248.exe

  • Size

    7.5MB

  • MD5

    8a963cc62a18f4a3b17facd196c62410

  • SHA1

    feac1da104b9c27ac9b8721fc92dd989652213b2

  • SHA256

    8c8a299a1d072e928796937381976c2acba7268bbfbd638dcceb651d40e4d248

  • SHA512

    49a2ed01a0f3e9c5b58b14463d2ae57003262d6522466e7638a6f968243ab11a2dee0561e372d6507e8fd4b1dacf731f51bdb7648d749560f96f9de8caff1caa

  • SSDEEP

    196608:/pVDDR8SZqepbLqwjKpDf/NIpEpDqfBrT0/WViLFfzj:/pVBtvpbL/+vVYBrTTefzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c8a299a1d072e928796937381976c2acba7268bbfbd638dcceb651d40e4d248.exe
    "C:\Users\Admin\AppData\Local\Temp\8c8a299a1d072e928796937381976c2acba7268bbfbd638dcceb651d40e4d248.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Users\Admin\AppData\Local\Temp\is-Q5AG3.tmp\8c8a299a1d072e928796937381976c2acba7268bbfbd638dcceb651d40e4d248.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-Q5AG3.tmp\8c8a299a1d072e928796937381976c2acba7268bbfbd638dcceb651d40e4d248.tmp" /SL5="$50230,7565670,68096,C:\Users\Admin\AppData\Local\Temp\8c8a299a1d072e928796937381976c2acba7268bbfbd638dcceb651d40e4d248.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3404
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4116
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4516
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3564
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4604
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:1336

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        250KB

        MD5

        af6e49f1b98364780a7a778c0749f669

        SHA1

        89ccdf963c9b0267af1b1bfa4d7138f597638271

        SHA256

        fae0157c41d14003bc70a70ab29ce90c71de9c03e36430e1361a4f9cf2e5fb9e

        SHA512

        228df1497067de60664d29b5730374652d3376d2b2dbe67efe559d1f6ef66eb791c8d8034c255cb5503c6d24e3a289d37523a463e3c5b30caf910035502b337a

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        67KB

        MD5

        65a218c2efa76603fd13d045f6342cb0

        SHA1

        4673e914395b62cc05f7eb17a9454c288dbc2f22

        SHA256

        fa6e131a3e40ebe43602389c8ca156536892889bfff9b402006dc608a27f7aef

        SHA512

        c4833b7ec114447c96a35a597bb8687e7fcc84f5ecf3bfff76b755b1e880f6712b1e604bd64878afa847f2c70f75381145a9453905b6fcbb53d7332225142416

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        155KB

        MD5

        739c2f98193f6caed91146e74acb0a3e

        SHA1

        f475383aa262a0376cc22d076bf15e9b76833b8c

        SHA256

        a05f8388533584e7d7f0a139913710a65f5cc13e5722e180254ee3cac9593d9f

        SHA512

        dc64ff824b9ef43738e92e132fe8d49f16dd1fcdee1c1077197f0a1bd20ba2ec92fdafe2a393bb15db6b64d61fbb2eb54d4e4003bfd054bd43be4721da3dbe2b

      • C:\Users\Admin\AppData\Local\Temp\is-Q5AG3.tmp\8c8a299a1d072e928796937381976c2acba7268bbfbd638dcceb651d40e4d248.tmp

        Filesize

        1KB

        MD5

        3f9cd57079674ffa5d6b1d7423284e16

        SHA1

        5207c87c859519caa8089d6183cbe3d0d73eb59e

        SHA256

        5b0edf297592c76a966a7959ddf2f2c68c41b1702dd93a935bc14022985a9ab7

        SHA512

        523cbde2be906f53b791376f565e7dfa02cc96c8be9d0bcbbad217727f68299ae63a1b82aa16a98c1cba15a61724f5773ed2a05d0caacc423895cb86591407e5

      • C:\Users\Admin\AppData\Local\Temp\is-Q5AG3.tmp\8c8a299a1d072e928796937381976c2acba7268bbfbd638dcceb651d40e4d248.tmp

        Filesize

        33KB

        MD5

        d7de559be1657c81d18f144c00876f9e

        SHA1

        0f3cb12ed444e732a8649f210744598333e8c597

        SHA256

        f1ae8a1393b0e27693a6845bb17af01ee357e1fbe7652141d43cc6ba496cabac

        SHA512

        f1482fbb613a02a715d6ab5c1231d95fa868f065cfedc791e5c00abd8e0773f8e028873fd541c950e81b9498b59b5b0dcbd57686b710dd084df1645d47df102b

      • \Users\Admin\AppData\Local\Temp\is-ODIFL.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-ODIFL.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/3404-7-0x0000000000660000-0x0000000000661000-memory.dmp

        Filesize

        4KB

      • memory/3404-162-0x0000000000660000-0x0000000000661000-memory.dmp

        Filesize

        4KB

      • memory/3404-160-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/4116-154-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4116-152-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4116-151-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-175-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-169-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-207-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-204-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-161-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-201-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-166-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-179-0x0000000000850000-0x00000000008EE000-memory.dmp

        Filesize

        632KB

      • memory/4516-178-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-172-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-158-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-157-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-165-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-182-0x0000000000850000-0x00000000008EE000-memory.dmp

        Filesize

        632KB

      • memory/4516-185-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-188-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-189-0x0000000000850000-0x00000000008EE000-memory.dmp

        Filesize

        632KB

      • memory/4516-192-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-195-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4516-198-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4708-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4708-159-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4708-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB