Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    134s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 15:59

General

  • Target

    c1e9ae0af6966c902cbe2685f0867e47465b27f9c69c7d4c6467c433b6c9bc5a.exe

  • Size

    7.6MB

  • MD5

    f027d7b5f6333a3947ae91d893f77160

  • SHA1

    b5662f15e8dbfe9b5cc95676d9d25272730e80af

  • SHA256

    c1e9ae0af6966c902cbe2685f0867e47465b27f9c69c7d4c6467c433b6c9bc5a

  • SHA512

    5aac5e332b14524bdb229784810c1eb35ee9c42f956821dcd5a79d99060e63d74e0fb6900997de2c5555fc9d9839ddccede21c047f84d35b40887d6081fed776

  • SSDEEP

    196608:tnnY8NWvGpWTTlm0OxwW+nFnfZsMUdFt30Dzj:tnnY8NELTIrxwlxQWDzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1e9ae0af6966c902cbe2685f0867e47465b27f9c69c7d4c6467c433b6c9bc5a.exe
    "C:\Users\Admin\AppData\Local\Temp\c1e9ae0af6966c902cbe2685f0867e47465b27f9c69c7d4c6467c433b6c9bc5a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3832
    • C:\Users\Admin\AppData\Local\Temp\is-SI9OM.tmp\c1e9ae0af6966c902cbe2685f0867e47465b27f9c69c7d4c6467c433b6c9bc5a.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SI9OM.tmp\c1e9ae0af6966c902cbe2685f0867e47465b27f9c69c7d4c6467c433b6c9bc5a.tmp" /SL5="$80224,7715663,68096,C:\Users\Admin\AppData\Local\Temp\c1e9ae0af6966c902cbe2685f0867e47465b27f9c69c7d4c6467c433b6c9bc5a.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4188
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4468
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2324
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:1408
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:3416

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        112KB

        MD5

        1e5a29aa579b77fa6d5535e7323702c9

        SHA1

        b09e48ca563c9b5f9ac5c38e6b3a8e7ac49bb6b5

        SHA256

        42dc528fa9be09fe1607635741d4a6162b4052bac63b6030caf0c0d6c622caa2

        SHA512

        adebffe077b3861efd296157395fd1e95e43c71399d23cc2173ceb395f01d86ec7c9e7d3eed02dd138b98d1a5042aea920370553d76ecf8ba55c3c11ba1e3041

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        141KB

        MD5

        c2185968ec4ff41031f14709ef6c0fb4

        SHA1

        8f72558cf531d2e346addd8e0d4dac952f9f887d

        SHA256

        6e278e1ae3737efcf60a0e72115dd728199fb4f09645da27712b1bfee786fcfb

        SHA512

        fea2823e742843b0ed6fda24becd2aeb83f00ae833d4985c749e6f4c6eb98e33182715d31a50d2d02a1ebd787f0d0b0487b7cd5ad5e0d9f87ba03799482e20bb

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        44KB

        MD5

        1182cf319e6baa3ab778750d3f9cc03a

        SHA1

        6745b7b63e8f4a1ba2bc130a2e4ee5118b319088

        SHA256

        fff234f2b5a9ddc7e580519554a2560798c720a9196d5686dfc4f2d84c80beac

        SHA512

        6e4393069a4e11ddfb1fa66fbccb9ef22b40241a223dc9538dabfb3f114883ccce6e86c85d9f0f536ff5decb0fe77842871e34ada7b6feb1fb80d219d1a41213

      • C:\Users\Admin\AppData\Local\Temp\is-SI9OM.tmp\c1e9ae0af6966c902cbe2685f0867e47465b27f9c69c7d4c6467c433b6c9bc5a.tmp

        Filesize

        65KB

        MD5

        0523a57608977b4c96bb980f71e96635

        SHA1

        e61d118df16d733beac784ef5d9b07f6782bf36a

        SHA256

        b48fb59a8840ebd4647bf6653e220ca478368c7f7c0a4f1de41064ffa117ed13

        SHA512

        906e7dab344d45da3529a0c953331525f2dc69cf2c3c88065d326e4296f08fc74f4c98f1385873635ab55e44cc9eee9154a67e4cff3918f870b014eb3b1833d7

      • C:\Users\Admin\AppData\Local\Temp\is-SI9OM.tmp\c1e9ae0af6966c902cbe2685f0867e47465b27f9c69c7d4c6467c433b6c9bc5a.tmp

        Filesize

        1KB

        MD5

        14d083317674748d4cb8e3384484c890

        SHA1

        6b8c9037700f569ae228d1c8998b1d9faea21a48

        SHA256

        199e49960b2cc64da68cc9822271d7a667112c42703f976d38258f8c83a78a67

        SHA512

        f3d093902aa2d158e726ac6dfd689036352fdef5c6345941cc747fc175701ccc4e0215567e9620abfd17fa3f84cab07e1654957ce56c2fce4a6b898faf253de2

      • \Users\Admin\AppData\Local\Temp\is-Q7684.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-Q7684.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/2604-10-0x00000000005D0000-0x00000000005D1000-memory.dmp

        Filesize

        4KB

      • memory/2604-163-0x00000000005D0000-0x00000000005D1000-memory.dmp

        Filesize

        4KB

      • memory/2604-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3832-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3832-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3832-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4188-151-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4188-152-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4188-155-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4188-154-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-162-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-181-0x0000000000850000-0x00000000008EE000-memory.dmp

        Filesize

        632KB

      • memory/4468-157-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-166-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-167-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-170-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-173-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-176-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-179-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-159-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-180-0x0000000000850000-0x00000000008EE000-memory.dmp

        Filesize

        632KB

      • memory/4468-186-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-189-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-192-0x0000000000850000-0x00000000008EE000-memory.dmp

        Filesize

        632KB

      • memory/4468-193-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-196-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-199-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-202-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-206-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4468-209-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB