Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 20:06

General

  • Target

    539f6c87b53a72576f3e5f542deffa5eae51474169c8afc44363ff1616e8abdc.exe

  • Size

    7.6MB

  • MD5

    b724fc814096e88c83cda8b840431d8f

  • SHA1

    adbb6ddd7666cd359c8d99fd7d8faafd130acc36

  • SHA256

    539f6c87b53a72576f3e5f542deffa5eae51474169c8afc44363ff1616e8abdc

  • SHA512

    eff587be1cc1b97b85e6097b1d4c2eac2d61303ce4d65de794d9f50d48e3d8a54d31f6ba29ea5a36cebeed6e4fc5f6b6b75fce402f9243646fb97dfd424c6f1a

  • SSDEEP

    196608:wnnY8NWvGpWTTlm0OxwW+nFnfZsMUdFt30Dzj:wnnY8NELTIrxwlxQWDzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\539f6c87b53a72576f3e5f542deffa5eae51474169c8afc44363ff1616e8abdc.exe
    "C:\Users\Admin\AppData\Local\Temp\539f6c87b53a72576f3e5f542deffa5eae51474169c8afc44363ff1616e8abdc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Users\Admin\AppData\Local\Temp\is-FNA52.tmp\539f6c87b53a72576f3e5f542deffa5eae51474169c8afc44363ff1616e8abdc.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-FNA52.tmp\539f6c87b53a72576f3e5f542deffa5eae51474169c8afc44363ff1616e8abdc.tmp" /SL5="$701EA,7715663,68096,C:\Users\Admin\AppData\Local\Temp\539f6c87b53a72576f3e5f542deffa5eae51474169c8afc44363ff1616e8abdc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
        3⤵
        • Executes dropped EXE
        PID:4896
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\system32\net.exe" helpmsg 11
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:196
      • C:\Program Files (x86)\PlayGIF\gifplayer.exe
        "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
        3⤵
        • Executes dropped EXE
        PID:4368
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4512
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:2408

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        419KB

        MD5

        5f8f376e5375b48f83c50d23ebbcf94f

        SHA1

        0352cb40813e08bcfc8cde1aaf24accf47c4ce85

        SHA256

        938d3fd342a7aa7145771d85532d280b71a2a1aaa8b5ebb877ec5df24936f0d3

        SHA512

        7f210d87f544ae801f0f007395427904caa049d0f47acbf9abedb2a20f1c5c7a096588159e6eb2c7c3cff045654680ea739bc690343f6ad6f69d25bad2e2ef84

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        4KB

        MD5

        1e5ad097135dfa884859a049816db4fe

        SHA1

        b09ff2bc7a341d4f47814697cc3b39dbdcb6c50e

        SHA256

        734f0bbb14750963fef114766f8e231b135dfd63cfbbc1714e193144b592e57f

        SHA512

        17c4f19dc3bd56c545339f1536e35379c38efa215e1c387a620aea05fbe4b15eb1dab5814f0d8e69c28589d4bb0fcd9f69d6ecc09b859adbb4d6006fdb25e3c8

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        323KB

        MD5

        63fe34e2899a72e6d5fa6eda676aa176

        SHA1

        d9b60d22c19ef1e2ebb05c3e54bd8670bae878bf

        SHA256

        4e5f2505b04d81e94b28e56a7a1ef4f8b45a880540efd68dae39b78d7c7e83bf

        SHA512

        0254f5e5f1cb714e03899316159e29ff52e5693bb72badc69530f897fcbc5316793372f0f28b3c92aa2f41bc72d5ff2696280fc0828d80dda3ccbc4de2eaaaa8

      • C:\Users\Admin\AppData\Local\Temp\is-FNA52.tmp\539f6c87b53a72576f3e5f542deffa5eae51474169c8afc44363ff1616e8abdc.tmp

        Filesize

        156KB

        MD5

        808c9cd6176dce16aed90f04621ed50e

        SHA1

        5bffb3cf21f660859cb07b45984207db1d15378d

        SHA256

        64e333b1ec5adf72bad6b9cdeb31514c7990bed425058cc80661777a2a8af93a

        SHA512

        d1a0743cdfd2852d384280ef7723c112588e918fb22d2396a7ceb824714bb845b29c21cd758bf49d4b74a7a97d6b895a39a28cff51106eb97a232ec8bb40712f

      • C:\Users\Admin\AppData\Local\Temp\is-FNA52.tmp\539f6c87b53a72576f3e5f542deffa5eae51474169c8afc44363ff1616e8abdc.tmp

        Filesize

        212KB

        MD5

        4d1ebd4fe6900db1489d9ecb7ec85822

        SHA1

        5a3672c72b6baa1ae01c99bfc333f23324362c71

        SHA256

        3a8c88b88767a117e12205437b026e743233f8d174efbab8f7918000d05b7eda

        SHA512

        95f9df141f68fd231b8b4e1606feb295bc0de31c232b09c44a26650224985f100e96b3917638ceec6322d6ac9dca9642dbc11d11ae5903f83e113270247f328d

      • \Users\Admin\AppData\Local\Temp\is-DVI4K.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-DVI4K.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/3192-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3192-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/3192-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4136-163-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/4136-7-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/4136-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/4368-155-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4368-152-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4368-154-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4368-151-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-162-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-183-0x0000000000780000-0x000000000081E000-memory.dmp

        Filesize

        632KB

      • memory/4896-157-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-167-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-166-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-170-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-173-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-176-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-179-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-159-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-180-0x0000000000780000-0x000000000081E000-memory.dmp

        Filesize

        632KB

      • memory/4896-186-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-189-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-190-0x0000000000780000-0x000000000081E000-memory.dmp

        Filesize

        632KB

      • memory/4896-193-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-196-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-199-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-202-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-205-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB

      • memory/4896-208-0x0000000000400000-0x000000000068F000-memory.dmp

        Filesize

        2.6MB