Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2023, 04:10

General

  • Target

    fe3c2f3979607205a94b90a7e6c9e8cb7939d1e90146c2dd7b0e31feee162eb1.exe

  • Size

    7.5MB

  • MD5

    a4af3e98af6f82a48c62ed77c22e9220

  • SHA1

    363ab28b754219c5e87330682bf991e051971c03

  • SHA256

    fe3c2f3979607205a94b90a7e6c9e8cb7939d1e90146c2dd7b0e31feee162eb1

  • SHA512

    1a9151282d3b693eab2f5576452c15cfdc3d5779faab5a9ad98f8bb3a2d4fa10719fc5ff5a033038b5e8cb391f539d8995d3d0ba48fa963e91c7dc2269f204d4

  • SSDEEP

    196608:mq/iLRC0OLkYNew6tjCtD2RQVsBp4UAzj:mHC9Lkuew6t2oCO9Azj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe3c2f3979607205a94b90a7e6c9e8cb7939d1e90146c2dd7b0e31feee162eb1.exe
    "C:\Users\Admin\AppData\Local\Temp\fe3c2f3979607205a94b90a7e6c9e8cb7939d1e90146c2dd7b0e31feee162eb1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\is-BNB64.tmp\fe3c2f3979607205a94b90a7e6c9e8cb7939d1e90146c2dd7b0e31feee162eb1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BNB64.tmp\fe3c2f3979607205a94b90a7e6c9e8cb7939d1e90146c2dd7b0e31feee162eb1.tmp" /SL5="$50064,7577497,68096,C:\Users\Admin\AppData\Local\Temp\fe3c2f3979607205a94b90a7e6c9e8cb7939d1e90146c2dd7b0e31feee162eb1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4668
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:3960
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -i
          3⤵
          • Executes dropped EXE
          PID:4244
        • C:\Program Files (x86)\PlayGIF\gifplayer.exe
          "C:\Program Files (x86)\PlayGIF\gifplayer.exe" -s
          3⤵
          • Executes dropped EXE
          PID:4872
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 11
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4472
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 helpmsg 11
      1⤵
        PID:1360

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.3MB

        MD5

        eaa233e2804c7ae53e4cbc78f894d6e5

        SHA1

        54a24d310aea7fb7c6e6c04858c25bfa216cac53

        SHA256

        62e8d1db5a22b9c51e2fced17a5af9cd4554ebbb84e2719375ec6277019ad276

        SHA512

        4fc1be28a3dfd369a9a57f2cb9e592b768c5130d8495e6299dff9161f76ddf5d9fee0ebcb7ddd8aadf1edc9b70c2f30276e3442ddc08d8c830693214dff9a527

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        1.2MB

        MD5

        c010c1286ab3a4471decc7b8542ccf48

        SHA1

        d92fee205336fd6f34ffed1b46778d9dc836980e

        SHA256

        4f02878970d307b875da965f3050749a5f735f9e9017e61d22a0eee500d6d3f5

        SHA512

        a2034a262f16ddd6777f3ce85f57390fd43a2bfeb087ee833005295716642cdecda83f611e7dab77db5f1ee2fd828a8806f9f05cf8919ae4cbea5cccf0f8c921

      • C:\Program Files (x86)\PlayGIF\gifplayer.exe

        Filesize

        499KB

        MD5

        083470b912a7dd398a2e006fb2c98687

        SHA1

        ba9070a5b91773b15787805fe4bcd52a4c75dbc9

        SHA256

        d0cfdcf786bb08b0fc1e741dd5fd473cef02bbee96777fa8f067cd7bab52da48

        SHA512

        7bf75bcbb7a2ee2b30ff3ae4c9846ae251890e9d3484858995ade85f7a3ba042ec57eec70ec56e90f617fd1efd3bc8175c3613fad29a31c836a6d8201695d806

      • C:\Users\Admin\AppData\Local\Temp\is-9C7LI.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-9C7LI.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • C:\Users\Admin\AppData\Local\Temp\is-BNB64.tmp\fe3c2f3979607205a94b90a7e6c9e8cb7939d1e90146c2dd7b0e31feee162eb1.tmp

        Filesize

        660KB

        MD5

        40f759a515141e25cfa71d90c6eeed4d

        SHA1

        59b408c7167d4f40e97364af18dd7f883bd9b8b7

        SHA256

        f8e76c54de5a2cc5005b101ef1d2376e8e42fac1d66ba662d1f4c05888fa96cb

        SHA512

        f97ae1ae48ca46c15a66bb3ee3a3d4e6b30709e9c1e4e62a23b1499cfcdc57a89e3dbf4c6ee5eee7d1a2551996d2cc7d65840f40df1ed3c249297f49169949b5

      • C:\Users\Admin\AppData\Local\Temp\is-BNB64.tmp\fe3c2f3979607205a94b90a7e6c9e8cb7939d1e90146c2dd7b0e31feee162eb1.tmp

        Filesize

        294KB

        MD5

        e41f5a220faf1086fc62a2985c2e1eb6

        SHA1

        7a27f9d854cd72dfdb5df3db62ae47674e4cbc92

        SHA256

        837e6773f38e3c49b73bde653b123497abcdee78a763f6e9164eaa038ef6fee5

        SHA512

        5e550ed1922ce84d321a60d9e5d76d09f6ced2f88eb277da3428606cc8d2cb79b53c2bece0433f6dfd69d775063b34e23cb4978c50f416e77d33aa7c259903e3

      • memory/4244-155-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4244-151-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4244-152-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4244-154-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4616-2-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4616-0-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4616-160-0x0000000000400000-0x0000000000418000-memory.dmp

        Filesize

        96KB

      • memory/4668-9-0x0000000002230000-0x0000000002231000-memory.dmp

        Filesize

        4KB

      • memory/4668-161-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/4668-163-0x0000000002230000-0x0000000002231000-memory.dmp

        Filesize

        4KB

      • memory/4872-162-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-181-0x00000000007B0000-0x000000000084E000-memory.dmp

        Filesize

        632KB

      • memory/4872-157-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-166-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-167-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-170-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-173-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-176-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-179-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-159-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-180-0x00000000007B0000-0x000000000084E000-memory.dmp

        Filesize

        632KB

      • memory/4872-186-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-189-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-190-0x00000000007B0000-0x000000000084E000-memory.dmp

        Filesize

        632KB

      • memory/4872-193-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-196-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-199-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-202-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-205-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB

      • memory/4872-208-0x0000000000400000-0x0000000000666000-memory.dmp

        Filesize

        2.4MB