Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/12/2023, 14:52

General

  • Target

    516e5869a4e837657fa07ba37d90cc35874d2f5c6302cb5c2ad2bf03e5efa710.exe

  • Size

    7.2MB

  • MD5

    d9d5bc1aa0677b2c157bc2ca1628b39f

  • SHA1

    31af44a1f0b0417e0848af9f800bcf4399f9b0a8

  • SHA256

    516e5869a4e837657fa07ba37d90cc35874d2f5c6302cb5c2ad2bf03e5efa710

  • SHA512

    40165a7bc5c21c60cef9cf0105b994506ec689f3bb77c845e0f799463f13b4367ffc221778d3bebe145aca47247e7e0574f3c350a95661d9061b019dd4e1589c

  • SSDEEP

    196608:oxm56Uu8mvAF2l3qqRHw/djqMJueNbMvn+pXnhH5RCLK5Ehezj:hul8A3nHwljqMksY/4p5RC25qezj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 63 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\516e5869a4e837657fa07ba37d90cc35874d2f5c6302cb5c2ad2bf03e5efa710.exe
    "C:\Users\Admin\AppData\Local\Temp\516e5869a4e837657fa07ba37d90cc35874d2f5c6302cb5c2ad2bf03e5efa710.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Users\Admin\AppData\Local\Temp\is-60A5V.tmp\516e5869a4e837657fa07ba37d90cc35874d2f5c6302cb5c2ad2bf03e5efa710.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-60A5V.tmp\516e5869a4e837657fa07ba37d90cc35874d2f5c6302cb5c2ad2bf03e5efa710.tmp" /SL5="$110042,7260641,121856,C:\Users\Admin\AppData\Local\Temp\516e5869a4e837657fa07ba37d90cc35874d2f5c6302cb5c2ad2bf03e5efa710.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3296
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:4760
        • C:\Program Files (x86)\numGIF\numgif.exe
          "C:\Program Files (x86)\numGIF\numgif.exe" -i
          3⤵
          • Executes dropped EXE
          PID:460
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\system32\net.exe" helpmsg 12
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:632
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 helpmsg 12
            4⤵
              PID:2256
          • C:\Program Files (x86)\numGIF\numgif.exe
            "C:\Program Files (x86)\numGIF\numgif.exe" -s
            3⤵
            • Executes dropped EXE
            PID:704

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\numGIF\numgif.exe

        Filesize

        2.0MB

        MD5

        da9e40ef684887d8184fa75b421ff3b7

        SHA1

        fb4c996117dddcba3d6311568fcd41de3daf99e9

        SHA256

        1d6db406a20d8b8e43cc99d9417cf82ab5da58c78d2ddf98647759d33a4d1743

        SHA512

        9d12082890e7b4ca1d6eb450216ed22ae17346ab6f42d8973ee90b026ccf2002147fb0ed59c94ef6052f4a6dc371671822e43c4cdccb124c60c3a70adc3f367d

      • C:\Program Files (x86)\numGIF\numgif.exe

        Filesize

        1.5MB

        MD5

        dd2485ae9a0264917d508bd7a1fc24ae

        SHA1

        e439e7433519e5721d7624f44a0af76f9dd08a40

        SHA256

        e0ad507adf116ab76a88d5c00c6586d4a1090f313fa348b6bdc4cdfe46f6a65e

        SHA512

        f17b6f66fdf09e31aeb181db84166e439dc818f1a0de0f132a4c2d46c9dad558215687f22ee9c3e5d83d693059109ecd16d352801b54d9c8e1ca5afa60b9c917

      • C:\Program Files (x86)\numGIF\numgif.exe

        Filesize

        1.0MB

        MD5

        3cbb43d3dce1fe5f56a95643a43bbd99

        SHA1

        a7c9c46de31aa78fed79ad557fd341181046243a

        SHA256

        b858a3c8605c745cca60725aa5735f130f1fa457d290d3f6fed92ec54e8774ce

        SHA512

        dfaa594ba99ae2404a9a145516b8beb1301e499858f105d4ee10dc1d660c0593aeec9ca558525ee538847059768c8e74db98025507c506b8066d184e3787ec9f

      • C:\Users\Admin\AppData\Local\Temp\is-60A5V.tmp\516e5869a4e837657fa07ba37d90cc35874d2f5c6302cb5c2ad2bf03e5efa710.tmp

        Filesize

        687KB

        MD5

        f448d7f4b76e5c9c3a4eaff16a8b9b73

        SHA1

        31808f1ffa84c954376975b7cdb0007e6b762488

        SHA256

        7233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49

        SHA512

        f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4

      • C:\Users\Admin\AppData\Local\Temp\is-FBUOB.tmp\_isetup\_iscrypt.dll

        Filesize

        2KB

        MD5

        a69559718ab506675e907fe49deb71e9

        SHA1

        bc8f404ffdb1960b50c12ff9413c893b56f2e36f

        SHA256

        2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

        SHA512

        e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

      • C:\Users\Admin\AppData\Local\Temp\is-FBUOB.tmp\_isetup\_isdecmp.dll

        Filesize

        19KB

        MD5

        3adaa386b671c2df3bae5b39dc093008

        SHA1

        067cf95fbdb922d81db58432c46930f86d23dded

        SHA256

        71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

        SHA512

        bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

      • memory/460-154-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/460-155-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/460-150-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/460-152-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-161-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-187-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-207-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-158-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-204-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-201-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-197-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-194-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-165-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-166-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-169-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-172-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-175-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-178-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-179-0x00000000007F0000-0x000000000088E000-memory.dmp

        Filesize

        632KB

      • memory/704-184-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-191-0x0000000000400000-0x0000000000629000-memory.dmp

        Filesize

        2.2MB

      • memory/704-188-0x00000000007F0000-0x000000000088E000-memory.dmp

        Filesize

        632KB

      • memory/2712-0-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB

      • memory/2712-159-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB

      • memory/2712-2-0x0000000000400000-0x0000000000425000-memory.dmp

        Filesize

        148KB

      • memory/3296-7-0x00000000007A0000-0x00000000007A1000-memory.dmp

        Filesize

        4KB

      • memory/3296-162-0x00000000007A0000-0x00000000007A1000-memory.dmp

        Filesize

        4KB

      • memory/3296-160-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB