Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 14:27

General

  • Target

    00d20fcc8774b6b06941389c3dd24ea6.exe

  • Size

    346KB

  • MD5

    00d20fcc8774b6b06941389c3dd24ea6

  • SHA1

    c06d16f87055b17187d662403ef9f3dd31de6a0d

  • SHA256

    08b38a7c0008746e2b16eb062cd535ca3a4a7f01a51e10a2b4620300add8aca0

  • SHA512

    927d07bc84babfb621dafc1ab0a896c9a956c75ccd8030de716f521c907917c7c4ea3450f4d030f711bb5f6decf9ac28ed0b4bfc7aa950184ca388cd0c34e64d

  • SSDEEP

    6144:SY94NtgVD0lkv61My/nhzwdyVzwKoRfVSydIeyogA5oKKiZDoRSDzdPnaz8FnXj:R9OtgVD0jp/nSdyNgRfVDIeyXA5j8SgY

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00d20fcc8774b6b06941389c3dd24ea6.exe
    "C:\Users\Admin\AppData\Local\Temp\00d20fcc8774b6b06941389c3dd24ea6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\bpk.exe
        C:\Windows\system32\bpk.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Installs/modifies Browser Helper Object
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2368
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AutoTH.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\AutoTH.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\AutoTH.exe

    Filesize

    256KB

    MD5

    eeba36e528f20d6de3bce6864d037db4

    SHA1

    92dbd7903e4f91bd6110289b860f769d9e41560e

    SHA256

    3d86feacbc8ae6916ccd8aa746cc1fc9f96fca1f627073f87d6633d3eada3dd9

    SHA512

    165cf2583515a97d84c63eb4c5ad886d1c8509b1acb9716c5477652d51e3ede3419138fefa6692ac3b2deef8e29d5a36c6dbd066e2ae7a7f24d8d83adc28b518

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bpk.exe

    Filesize

    388KB

    MD5

    6a2f05f2a1f105d5df14c28b2b218cdb

    SHA1

    817d7a45fb9c7cff9a9d277661fa45e5e83d29b6

    SHA256

    74b10b45db9c902294c6da1ac6c3fb73c9f5b732902aa0945fe61bf07b99b499

    SHA512

    ecd92c75ccf9b6c70ecae38cc6d64345b84e48b13c124a57d02484f88dc5fdd9f0447e889269b2e8aac1c31aca16227bc5a663da616e0ec15350473f20932195

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bpkhk.dll

    Filesize

    24KB

    MD5

    5f289ddb7bd9fcc086ea15cf1b287738

    SHA1

    0cb59fae3271117d72362df41b021af1f0eead30

    SHA256

    ffb19aa5f20e357f0d740bcf00a0d5e63f906f7850c8e045bd0658be32c78c98

    SHA512

    65f88df24d577675e56dd5fa1e68700345fa2f8bd97969ae8ced0f3fe62e62cff34eb222892b6453657897121bfecc037cd7b6b5210281cc6f4f17b069447006

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bpkwb.dll

    Filesize

    40KB

    MD5

    09867a78217e803a78e91b4d19fc1788

    SHA1

    150bda8f59fb2d1391b9d71fb2ed6c65da7b34d8

    SHA256

    c2bc5ea23fca24ec9c7be453ced782a65dff274fdabff54c91bf602c5a8eec61

    SHA512

    b60938b1819729712b53c0d0ad2cff265bd762e967af0a9f009ef2f5adf49c44db82d75dc116bc43f79928e174e8eb8174c47b238eb5b8017725dcceaff77ae1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\inst.dat

    Filesize

    996B

    MD5

    59a67ba7ab2692a2115258bc8e784851

    SHA1

    b59852853f5c8234106deaff200aa93d178e5fbd

    SHA256

    edfbed04cd7accd7fc6020b35e8deffc27e20db785251e0ada1fbe542cfb754b

    SHA512

    f01594e7ce11e815b3eb27a99758a926e88a6ee3418c9c21037869558dcdb1af6aece5f6959cf6641649c4aedac1c96742687c85cb66b0959c5007037daa19cf

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mc.dat

    Filesize

    13B

    MD5

    97bf1237c5b58aa6a79e5f85e8ceaa34

    SHA1

    90cd0a53e8bcb2b85c8b33376e4d2fc314757797

    SHA256

    e79e4b84d17a0f92cdeaeddab47df78b1d8edd527c63551166ffd488ea28cd64

    SHA512

    93eaa01d17804cbe4fc466bb2852fdd23e247e55f417e7bdfdf7ebae3a4a242f8d03d4c23457cbbd33206b24c1b825513482f2dbfdb81d882fb3facb701ae576

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pk.bin

    Filesize

    4KB

    MD5

    a26d6380724f1d83898286ac85abb40e

    SHA1

    1ddc1cc337a348211af4dff4da42b47f27fa1af1

    SHA256

    b5278003c43956c8476bd722abb4e17dfc31bcf5fd580dbca28b2cf5b04852b1

    SHA512

    7f6b4584b874061908cd36c606d55d97e7f3723f976df6589355bd2d15d8359fd0d324885f5754ebb21a0e3c63f79abfe4d4f3c49a0f8dca79a7a9ff2d22d6dd

  • C:\Windows\SysWOW64\bpk.exe

    Filesize

    320KB

    MD5

    88727941dea420af5555f21861398829

    SHA1

    2210b36a39dae6f87696f1d48962bcac86bece2d

    SHA256

    db88f83179f3724469b28371dfaa8b8bf398e3b270362372cf2dd751e5886e09

    SHA512

    a94dfb52e1698589acd7d4d379643e11f9adf46d01314d2ab4e8d31df71a5b298ee061cebc229d258d3fd30b81c21829d21e28b73c80baf94e583f918b90fbf0

  • C:\Windows\SysWOW64\bpk.exe

    Filesize

    286KB

    MD5

    459e1256ee39c06d2a3d4a0ebd4c2fc3

    SHA1

    9f3766df068c9fd2ff81d14fd92ea872c85f9641

    SHA256

    6a1b9152413c84a64802581d768aa3315d9ab3d3ab4b454d096a49b228910a54

    SHA512

    382d173090b81a8118e9f6918f6b7640e4024eaf80c5e458d18f754603fbb648bcb6318326734b0058795d0e5768ef6b31ee0d5388772158661bde9be37436e7

  • C:\Windows\SysWOW64\bpkhk.dll

    Filesize

    24KB

    MD5

    9ac9028338d1b353a7cacb563bb91df7

    SHA1

    a20c5dee8f05c91686324cec2d5b092bafe58339

    SHA256

    93c0e7f41d5d74217189e4cc2d5cdb8f97d8e5eeef0a0dcf4cecd67e3393682c

    SHA512

    ac83c8f7b6fe913487015d8d7a2e430e917d230b6b2907150f6c4a73bf64c3a02320dddc29fea03db5df8ac5620d8a902fe7be80ba1b1bd1e6f5b8b1b016ddfe

  • C:\Windows\SysWOW64\bpkwb.dll

    Filesize

    40KB

    MD5

    21d4e01f38b5efd64ad6816fa0b44677

    SHA1

    5242d2c5b450c773b9fa3ad014a8aba9b7bb206a

    SHA256

    3285df0c25d4b9b6d5ccbe166a3ce3d04f5cb3a0d61c8bf29bf5f953e51b0977

    SHA512

    77dae941676a56664da89c7670d29ed5402032c8040df1cc231986733c78f0dc56c41f7a276ec9ea8336e3fa2bfc68d3121048e9585bf0d8a98917d799f669b8

  • C:\Windows\SysWOW64\mc.dat

    Filesize

    13B

    MD5

    6d40bc78f0f60f7f4cb79dbe4bf4e859

    SHA1

    c0ff2a8603f5c9457738e02f4a782d23cd9ce5c8

    SHA256

    94879d9a09d496cb6d4fde906803d9c1ab48cbd43d7948dc3a3725f7360d59cd

    SHA512

    31338964cfa607dba7a73ea3395f7a8e38bf4ba6db5816eb07b7296ede5e9fcd23534b481e7fbd603a9560329d5919ebedc0a4b4712d26be35cd364c4c044f81

  • C:\Windows\SysWOW64\pk.bin

    Filesize

    4KB

    MD5

    8c638a380f5a6317eb32b078e94ef03d

    SHA1

    7dedae8aa12a5c729af2b39b75c007aae3d10461

    SHA256

    a3b7fb386769fbc4dd232bfa7677b2c1093f71352d444c2733e89c9aa062cc3f

    SHA512

    b28bedb7be6312306be6a0eb5545430806d3e10a33480b6fd945116b6a2e2be64be431f1ecb58c8e4234d4960fee86a3792848e861ad73f95fef84dd19e7d85e

  • \Users\Admin\AppData\Local\Temp\RarSFX0\AutoTH.exe

    Filesize

    300KB

    MD5

    69e68f8623905b7c933e663bdcf2e472

    SHA1

    a1f62be895669c0ef55f2bb0a78a8bf013f617a7

    SHA256

    1a3e2bc10c57a31acbdfbe814a244224762e11a7a5bd9492e2343a4fd9669079

    SHA512

    ba541b85038d6141f8db4b0877fa79b1c8961f0044ef17c748b4de04454148af4f025dedaa7503f11ae54188ba8e3131fdc07235f3545660309d223dd44e14f3

  • \Users\Admin\AppData\Local\Temp\RarSFX0\AutoTH.exe

    Filesize

    243KB

    MD5

    d75314cff37c0cda3b8140e6c69e7668

    SHA1

    40875febdaba6ad555f490ad286253327377e74d

    SHA256

    712bb9dc83c17d91923dab5eaa557627d65d10cb68fb306df38646a6abedd09d

    SHA512

    04743024dd1fa127df10e78902dbbed9e7445f837b8634ace1e14a8a2192f5a71b56c715505448f08e74476f5393b8e0219ff7fd28ff9e94c24361afb558188d

  • \Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

    Filesize

    7KB

    MD5

    fbe4bab53f74d3049ef4b306d4cd8742

    SHA1

    6504b63908997a71a65997fa31eda4ae4de013e7

    SHA256

    446658dd5af649857fff445c600f26cdc1d0c19c86a080f312b89b1890182092

    SHA512

    d458ab806a3ed3d1494a13ad8a75df874a0b227cb4f337996cb82df3c4a26dc9c4fe48a664b53b052a4af123ea8d89911d9d9493870e6b5992d5621a32260c2f

  • \Windows\SysWOW64\bpk.exe

    Filesize

    205KB

    MD5

    ade7dc91f9e28716ce149cbbc322a06c

    SHA1

    c8bc301e215eef1724661431da8a76a49bcb9491

    SHA256

    7856522cb2f3747d7645d3c9b3975608ae27f5f36427ee9a33083e074b06cd92

    SHA512

    badcad4561de11ec0899e2513d5c22de141087d406bdc0007740e271fc180448b843880d3aee51ab328a0c62c910bfe13846cb160f4ed0642b01363a78fda53d

  • \Windows\SysWOW64\bpk.exe

    Filesize

    201KB

    MD5

    048d683906ff8677b3adf3ad115d356d

    SHA1

    5e73f5c8933bea367b4ea96abdf218d5a9224fa2

    SHA256

    f627c237e5482a4f82e7f8c0926e4bba44ec3142df2aa5f4499c3fe222e526b7

    SHA512

    ff64b5ec30cfc99521cfd8b411302ec31662dbdf937be0dce8f8140045c6c822a272ab9ed336a99a56d0fa7ebeb09678acbc29c7d06ad1a327f43dfae83c0228

  • memory/2100-70-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2100-73-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB