Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/12/2023, 10:38

General

  • Target

    2847fed386f19179a30f2f36a21a4476d815683ac0f9b4a95f0d210f84762ce9.exe

  • Size

    7.2MB

  • MD5

    1274b7564a2efa609cc32671f562e22f

  • SHA1

    ee80cf0e2e131f175660b89cde568ac14ecf5cc9

  • SHA256

    2847fed386f19179a30f2f36a21a4476d815683ac0f9b4a95f0d210f84762ce9

  • SHA512

    71443c8f6d85fbc3c00bfed3b9f770de2ba8f3a48ac157a94429cefe2b4a49105b3582e693cdb034de1fac72dffc81ce7403fbab9f251b4e3dcdb9607ab945fb

  • SSDEEP

    196608:+xm5nCZjZ3QO7Kmk85hry72SfDYuahd3u/w2lzj:zC80q8y72Skua3+/Vlzj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2847fed386f19179a30f2f36a21a4476d815683ac0f9b4a95f0d210f84762ce9.exe
    "C:\Users\Admin\AppData\Local\Temp\2847fed386f19179a30f2f36a21a4476d815683ac0f9b4a95f0d210f84762ce9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\is-1MVSA.tmp\2847fed386f19179a30f2f36a21a4476d815683ac0f9b4a95f0d210f84762ce9.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-1MVSA.tmp\2847fed386f19179a30f2f36a21a4476d815683ac0f9b4a95f0d210f84762ce9.tmp" /SL5="$501FA,7251001,121856,C:\Users\Admin\AppData\Local\Temp\2847fed386f19179a30f2f36a21a4476d815683ac0f9b4a95f0d210f84762ce9.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3636
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:1396
        • C:\Program Files (x86)\numGIF\numgif.exe
          "C:\Program Files (x86)\numGIF\numgif.exe" -i
          3⤵
          • Executes dropped EXE
          PID:708
        • C:\Program Files (x86)\numGIF\numgif.exe
          "C:\Program Files (x86)\numGIF\numgif.exe" -s
          3⤵
          • Executes dropped EXE
          PID:4884
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 12
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4940
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 12
            4⤵
              PID:2832

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\numGIF\numgif.exe

        Filesize

        968KB

        MD5

        1ed61e59d3e21d5a9a0f071552fd1d65

        SHA1

        450b8c70a5240654ed4d5d55e6fcdce7ee26a92d

        SHA256

        a16d812cf9901defe615415fcd56e0a51a59fcc95a26078d4b6317a4a94c5788

        SHA512

        6e41ca01286c164095f3a58d6737c487dca2b08619d56c6c756ce362e691afc68f14e0a7782cc3c9fe96f47bae7da8242a47bb4ba998b81fc18a69c08b740ef4

      • C:\Program Files (x86)\numGIF\numgif.exe

        Filesize

        658KB

        MD5

        f7a955b6343f7b06f0a1199ff0cb6585

        SHA1

        c2a3f6f0ff7521c07c1d6e0d410741c59cbcbb93

        SHA256

        4cd7899bddb0577a274a558de0b03e058dc855968e3f58bbf306fcf529e3d758

        SHA512

        b2ac22ed107990dcd59ebf066cb07427ddbccd9fe7e8030ad3d4706f8299e01ce29c44eea0deb88c04f678922062a31300dc857bc2a7ec40d96925d181f465b8

      • C:\Program Files (x86)\numGIF\numgif.exe

        Filesize

        595KB

        MD5

        2ec371b618f066c10556af5912a9cc4d

        SHA1

        4b89583e8af5b28f14489d904a7989fa574bf323

        SHA256

        6fea87e8dc3ac1aa199cdf9fc4e817cd85d3d06af64b389ed21bb130c6ba8251

        SHA512

        154b24fd2eea5fb022e56c90e371ab9acf54bb945835766f4eae761b1cebdd83a3c077f485f9cb4efddbbce21d91d3450d52b84e65eb2b760aed363bbb85d14a

      • C:\Users\Admin\AppData\Local\Temp\is-1MVSA.tmp\2847fed386f19179a30f2f36a21a4476d815683ac0f9b4a95f0d210f84762ce9.tmp

        Filesize

        52KB

        MD5

        31e45942e9da5bfdc66e3f9062e2895a

        SHA1

        33b4708d6bea33e65f6eb4e4a31763b32a77c2ae

        SHA256

        6e78cd0120941a8784504cbff05f3acca0928a61a88068b6e19ac39634071f84

        SHA512

        3386618c5305a1f7127e3af1f153c08078ecf4aee90ad015f4462f7aea9f0cae2ae9e260323fb5cf4cbf1414e8f8dce4a98e314d18d0f91d9c4057e732bd0059

      • C:\Users\Admin\AppData\Local\Temp\is-1MVSA.tmp\2847fed386f19179a30f2f36a21a4476d815683ac0f9b4a95f0d210f84762ce9.tmp

        Filesize

        60KB

        MD5

        19f51a337f2e2cec006b029dd11e74e6

        SHA1

        7d8925179bda29e7f37754f664a5cfc0c9e6268a

        SHA256

        c053c7c2ce9f23944aee011195897a5264e5a490f2836a366ddb3860847d3d7a

        SHA512

        72df87ba28b5d240c727491023e30434bb43eb240ae250aafac505bcadcfbcf933356c9582b7ccaea575fd1d5dc2a2ff5e7bb053dc2933769a184db32b3f4ad2

      • \Users\Admin\AppData\Local\Temp\is-E9JVF.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • \Users\Admin\AppData\Local\Temp\is-E9JVF.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/708-154-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/708-150-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/708-151-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/708-153-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/3636-162-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/3636-160-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/3636-9-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/4884-192-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-178-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-158-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-161-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-208-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-165-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-166-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-169-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-172-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-182-0x0000000000810000-0x00000000008AE000-memory.dmp

        Filesize

        632KB

      • memory/4884-204-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-179-0x0000000000810000-0x00000000008AE000-memory.dmp

        Filesize

        632KB

      • memory/4884-175-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-185-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-188-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-189-0x0000000000810000-0x00000000008AE000-memory.dmp

        Filesize

        632KB

      • memory/4884-157-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-195-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-198-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4884-201-0x0000000000400000-0x0000000000628000-memory.dmp

        Filesize

        2.2MB

      • memory/4908-159-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB

      • memory/4908-0-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB