Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2023, 15:59

General

  • Target

    881adb3cb8df7cc9a102f94bc12d919e91aa5d813ff0b468d1fb0c0daa3d810b.exe

  • Size

    6.9MB

  • MD5

    df7109f61c3a4f36480a1a1dce67a9a1

  • SHA1

    512d43c664c866458c2951e5444b541e974cde29

  • SHA256

    881adb3cb8df7cc9a102f94bc12d919e91aa5d813ff0b468d1fb0c0daa3d810b

  • SHA512

    1fbc231ba7bf3d2ec959ab9b581f37a7570e4b82a232bcec7ff80f72d7bac257973aac749ecb25ed627cf82ef6e57c5879f4f172721fc873964e6af3b25259f0

  • SSDEEP

    196608:bbw61woT7mRIc+DaTblZEZTXuNkrAk8TQNY0pzj:bbw61woTCR9+OTbl0Zo/Gzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\881adb3cb8df7cc9a102f94bc12d919e91aa5d813ff0b468d1fb0c0daa3d810b.exe
    "C:\Users\Admin\AppData\Local\Temp\881adb3cb8df7cc9a102f94bc12d919e91aa5d813ff0b468d1fb0c0daa3d810b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Users\Admin\AppData\Local\Temp\is-9P2RR.tmp\881adb3cb8df7cc9a102f94bc12d919e91aa5d813ff0b468d1fb0c0daa3d810b.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9P2RR.tmp\881adb3cb8df7cc9a102f94bc12d919e91aa5d813ff0b468d1fb0c0daa3d810b.tmp" /SL5="$A005E,6958728,68096,C:\Users\Admin\AppData\Local\Temp\881adb3cb8df7cc9a102f94bc12d919e91aa5d813ff0b468d1fb0c0daa3d810b.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:1868
        • C:\Program Files (x86)\ConvertWMA\wmaconvert.exe
          "C:\Program Files (x86)\ConvertWMA\wmaconvert.exe" -i
          3⤵
          • Executes dropped EXE
          PID:3204
        • C:\Program Files (x86)\ConvertWMA\wmaconvert.exe
          "C:\Program Files (x86)\ConvertWMA\wmaconvert.exe" -s
          3⤵
          • Executes dropped EXE
          PID:1480
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4336
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 11
            4⤵
              PID:4152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\ConvertWMA\wmaconvert.exe

        Filesize

        819KB

        MD5

        d82e6c44f1a25528aecdba4529157832

        SHA1

        35cbe25efea5aa2baea6c2a01d0831e4a8dd2b48

        SHA256

        130435fe300780eb214bd74aebdbe56f0dd4f73f717be0217f24160eed6342cf

        SHA512

        466cb81154edfc34591350580424e118bc728d2dc1d9beec3bee046cabfdfe8f3667f2f418a77d7c0175b1e2ff28dde5758c57e497bebc6a71c3f7d8b39c1566

      • C:\Program Files (x86)\ConvertWMA\wmaconvert.exe

        Filesize

        878KB

        MD5

        02fbc26d0a7e06f7cb30db36a0584200

        SHA1

        2d00bc9fe5178a018f196cf7ff904a28485f6dbe

        SHA256

        80e9fa96af63f1b813a6aff7c670bfd440dea5b7b2b31561b8ce8074649affe8

        SHA512

        82931843d070bf93d32422f6266d8b78bc29ae14d0dbf90f863cfce2cae6e1209773d23117441acd5cb5368d7d789d1934312a11c973f7813fc9ade6fab845ad

      • C:\Program Files (x86)\ConvertWMA\wmaconvert.exe

        Filesize

        622KB

        MD5

        7b9f71bffa68fee3bff037b1e37b96d7

        SHA1

        f0d00097caebc4271e02a6406439cf5f5a49a7e7

        SHA256

        7de218662de336405c231af9991764d65ca288de58ffcc219e93ecd0a059bbec

        SHA512

        2b456e4fcaf1beea09caf7dfa8dd1ba2716e94f18070e23a847ace56647b5f509f84eb64380de1b4bb685d413410fb08fd688a83339facd8237cf7305fa06c3a

      • C:\Users\Admin\AppData\Local\Temp\is-1F3HQ.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-1F3HQ.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • C:\Users\Admin\AppData\Local\Temp\is-9P2RR.tmp\881adb3cb8df7cc9a102f94bc12d919e91aa5d813ff0b468d1fb0c0daa3d810b.tmp

        Filesize

        268KB

        MD5

        3003319991874fa221ce54af1407840b

        SHA1

        b1356945b58eb3df6164ed8fe967a474a62c2f76

        SHA256

        a68e22c31da5a0e4cd5cd814b2865c174d8cb0be266e0af3f88725f6efb5b4a3

        SHA512

        ef5257b6ffd9102c9d8b47f0cdc5b24edd0fbd0e20ac9b3a257036a99fff658f65146a5cef6ad30b4647c2e4f314d086d599a33c09067e5f42fdef3784bf9c32

      • C:\Users\Admin\AppData\Local\Temp\is-9P2RR.tmp\881adb3cb8df7cc9a102f94bc12d919e91aa5d813ff0b468d1fb0c0daa3d810b.tmp

        Filesize

        283KB

        MD5

        b77bd04194327c77d5fde4e490e6af78

        SHA1

        5ed9738f55bd9eda9cf86c120d2c7d9957efe54a

        SHA256

        b2ff6fe1660407379611e8ab8647b11978e363f43b113841258d5a533767a18a

        SHA512

        4d19fd74dd2abbc29a520d6246287a0727424c723ff903d9552fd70cc7d7b47fca7a3984a62ba96c547185184e1b405e9d716c55d04ea98da3038c56ced14b72

      • memory/1480-179-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-167-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-208-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-204-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-201-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-198-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-159-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-158-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-195-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-192-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-162-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-189-0x00000000008C0000-0x000000000095E000-memory.dmp

        Filesize

        632KB

      • memory/1480-166-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-188-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-170-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-173-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-176-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-185-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/1480-180-0x00000000008C0000-0x000000000095E000-memory.dmp

        Filesize

        632KB

      • memory/3204-155-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/3204-152-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/3204-151-0x0000000000400000-0x00000000005CF000-memory.dmp

        Filesize

        1.8MB

      • memory/3480-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3480-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3480-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4292-10-0x0000000000660000-0x0000000000661000-memory.dmp

        Filesize

        4KB

      • memory/4292-163-0x0000000000660000-0x0000000000661000-memory.dmp

        Filesize

        4KB

      • memory/4292-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB