Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 15:46

General

  • Target

    042d47eb51d6a3d799a5f68fba4197a2.exe

  • Size

    298KB

  • MD5

    042d47eb51d6a3d799a5f68fba4197a2

  • SHA1

    ce89cc2dcd05260481a398e956d3ff5b58023cba

  • SHA256

    34e44584e027f3cc20492606ea1353314566d7edda23030640b33216df4c5931

  • SHA512

    3431600313c353bfa5ecd6a2a4084f7de8d1be9792a38938b0f60fdf2199afe0825b7dcf9c3c4874acdfc54ccc894cbaf280083816f3d1838dd5735e29565501

  • SSDEEP

    6144:CzSY0RcrnbIFMzEOjh64JDZs6z7/WKtuujadWpOAX2uBYhmbK:uKcrnbIA7dTYKsujae2uChmbK

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\042d47eb51d6a3d799a5f68fba4197a2.exe
    "C:\Users\Admin\AppData\Local\Temp\042d47eb51d6a3d799a5f68fba4197a2.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun31.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\cacls.exe
        cacls "C:\Program Files (x86)\Internet Explorer\ie\iexplore.exe" /G Everyone:R /C
        3⤵
          PID:1532
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:664
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun95.bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2928
          • C:\Windows\SysWOW64\cacls.exe
            cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
            3⤵
              PID:1536
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
                PID:1872
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun25.bat" "
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2272
              • C:\Windows\SysWOW64\cacls.exe
                cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
                3⤵
                  PID:980
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                    PID:524
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun80.bat" "
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2788
                  • C:\Windows\SysWOW64\cacls.exe
                    cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\\Launch Internet Explorer Browser.lnk" /G Everyone:R /C
                    3⤵
                      PID:868
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                        PID:1824
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun24.bat" "
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1684
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        3⤵
                          PID:268
                        • C:\Windows\SysWOW64\cacls.exe
                          cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorer Σ»└└╞≈.lnk" /G Everyone:R /C
                          3⤵
                            PID:436
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun7.bat" "
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1196
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun82.bat" "
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2604
                      • C:\Windows\SysWOW64\cacls.exe
                        cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
                        1⤵
                          PID:1548
                        • C:\Windows\SysWOW64\cacls.exe
                          cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\\Launch Internet Explorer Browser.lnk" /G Everyone:R /C
                          1⤵
                            PID:1260
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            1⤵
                              PID:2468
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                              1⤵
                                PID:1932

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files (x86)\Internet Explorer\ie\iexplore.exe

                                Filesize

                                291KB

                                MD5

                                e21129d84fa9dc5605c11f763823eb2e

                                SHA1

                                33a9acb95c8ab02804ac8ffa33956257887abc70

                                SHA256

                                382e23fd30203654e2ff0680a0b1a332c7a0bfb0171a337e7b520d9543597d78

                                SHA512

                                cf949011b7fb939c2b267b726b89b157c2f19095b11e24b7e8332e4d30a8adc8e8fb295c5755fe387a13603da7767c3673e77641b4c8dd34c690556bb1d42457

                              • C:\Program Files (x86)\Internet Explorer\ie\iexplore.exe

                                Filesize

                                316KB

                                MD5

                                2ca8477662fc75ffc4d30abae2c47aac

                                SHA1

                                406993f34d697d07086f6987aeffa1e846c3b1a4

                                SHA256

                                27f37b93db1de253b981d3f3b36c588e3dbd2d561f1e79d9d4da1018ecdfa56f

                                SHA512

                                1cb5baede08c0975169668e9404529528e357fbf0ea882b9d447cdd85eb6bbba24653f1844754e32d29be1e6fbb797f4dea76c246fa605e868e93f95ff762611

                              • C:\Users\Admin\AppData\Local\Temp\srun24.bat

                                Filesize

                                191B

                                MD5

                                da3ff29afaafd2ce68b8856bf0db6c6f

                                SHA1

                                93aa5a582709e18d6e56056f99a5910feec3b305

                                SHA256

                                0859de63e4d9c3f9c0f402fe5c18151992b83fac001db1bd6514638847a2074e

                                SHA512

                                7a5dfc6f520d23eb1ee3f7b4d8dce72727f560f7cfc6a97bfe0c1f59ced7c88c770be7630b75c1a4374bc01594754ae468827f1a546c82e8119b577c31eb42c2

                              • C:\Users\Admin\AppData\Local\Temp\srun25.bat

                                Filesize

                                130B

                                MD5

                                d43c6b3b24c4bfff5b4a8aa3169ad86e

                                SHA1

                                b548a6d04fe5b2092a4ed67a9410f4bec661734e

                                SHA256

                                bce027e031c571d3f2df6e6a8a4cf2d7280327286e2f8accbc5894448e3cc111

                                SHA512

                                7c05c903dfd46a3a2cc504aeabcb9de1faf32a4210173314d9393bfa3773af00e0ea16952475e21264495ee488ea555b149ea6911f374c2ffa5d815da34f72b6

                              • C:\Users\Admin\AppData\Local\Temp\srun31.bat

                                Filesize

                                142B

                                MD5

                                de4d1de797a02c49f52de44ab64f85a4

                                SHA1

                                8732f32a26ca896f8dc7cf5364edfe4667e918c7

                                SHA256

                                67ffac484b1287c9ccdf3dbc220cd1964fb266311bb9055a3f0e2c5c0b030c5b

                                SHA512

                                8bf42a0abff1fa82e3a45e03e688e08f72ff730519bd87f01a71a41ba0156740f8b5be2c46bc18e62ab4de3f5e9f89dc21250314486057a00a65ba922a98ffe5

                              • C:\Users\Admin\AppData\Local\Temp\srun7.bat

                                Filesize

                                194B

                                MD5

                                e3fe36c33a7481f21afc6609a14f12c4

                                SHA1

                                3961c8a2b56e76e22caf9b3b4f1ceddecdb989be

                                SHA256

                                fc1bc7967a8fb95cbc4c0f9fad574f346392afd414db77a8cb458a98316cdf68

                                SHA512

                                db0e927e46264955ec281c174317a6686a6c5be5a5296edcb35d6722c33a1281a480f80b9665916ec4c205eb6dc19646adf8d7493a65cdced73898e615dca96d

                              • C:\Users\Admin\AppData\Local\Temp\srun80.bat

                                Filesize

                                195B

                                MD5

                                0786ab2a0f25a0eecfcdc04dbe08cf0e

                                SHA1

                                d5226ec5230397e129ef0a38b4335d9ec0aa845f

                                SHA256

                                a5a8540b3ba6729ca606a0770e8560774380e3fbace18020145b8c14a23568cb

                                SHA512

                                5db790b5b70e013be2a36ff5fde397759ed4aa0d851eec114d3a28a6d5a3e30cdca35dc8d8766ddf0253548d3b2f808c7ab8101f06997e9507368543545d9be9

                              • C:\Users\Admin\AppData\Local\Temp\srun82.bat

                                Filesize

                                130B

                                MD5

                                e106ce0fcbdff77bfd34c2c40aa9206b

                                SHA1

                                238b9a1479b6422f603699225fcab095276a1329

                                SHA256

                                d3473296990f23f30dff672443189a737b123e9360433d3e625dd5fe3915abe2

                                SHA512

                                e1d84f6b085270770f6e40339ba046090f00d14b0f6927bbc2684dc5561d92b7c916cea54e993d32deb1922be0f69ebb41105c2a1e1f459c4149405613c26306

                              • C:\Users\Admin\AppData\Local\Temp\srun95.bat

                                Filesize

                                130B

                                MD5

                                7449f7d68d34dc622026ac46e27faf17

                                SHA1

                                39cfecdba1a8298bf42bf844a09b36cb5ec78754

                                SHA256

                                89c625d781d5e7a253e30c9b9e32e65adf27cde4f6c46b10f283d2a1194c313b

                                SHA512

                                30711efa2124bd409a3a831d631f5b1ff0109b623eb1c340b644ce51dbbbb160b4b4a1c7d85cb2adaae1e03751b45795a67b29b9d20f2df2df45230bf5c22d5e

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk

                                Filesize

                                1KB

                                MD5

                                e6411f38e1560b07fdc5cd92ce1c3ae0

                                SHA1

                                268f063f11378b093b57c3aaa0b0e6dedb56aa2e

                                SHA256

                                d4dca3ab216141549798b1a109ef664a15067412f06630e89e615025e1aadda4

                                SHA512

                                00a8a20f0487119295f3f3e0d341a811eb0a3f072fcf7e612f799b64b870ea7b2fc73001a5df9cdc6b5ce4171a39d2b1171adecaf62417060c0fc8b14e151978

                              • C:\Users\Admin\Desktop\Internet Explorer.lnk

                                Filesize

                                1KB

                                MD5

                                54f0e92923fdacb750eecb988ce57fcf

                                SHA1

                                814e85adf55bb673eb0dfa9c87182a638baef4f3

                                SHA256

                                dc05c6888143d22e6b9d693ba7460ccf996b32624226dc16af8d2e6221b93f28

                                SHA512

                                c02eba1b375436fbe93fee47d7a8a88e35f761b4e4cbba400508aa6e6d80e30cc720f968a7929fb2625dc65c9c04d68611b074c20210036a37489355eaeb56bd

                              • C:\Windows\SysWOW64\Pnkd.exe

                                Filesize

                                298KB

                                MD5

                                cbae4ddcbbb3a5112b15bedf57780d21

                                SHA1

                                606e121d9aea16ba0357de09646be99308f828d6

                                SHA256

                                474253f9a7e8cf39972c247420f56fda7b817b79cd486fc6df3eadafe83e10ad

                                SHA512

                                9f58b634ffd5888ef9f77c21c4806dbecedfe069d3b229122b4e775ad93ce58350b3c196f85c9d718ee6c9001222e8313e97bc51d0c50a183aa60afe406c183f

                              • memory/1672-0-0x0000000000230000-0x0000000000231000-memory.dmp

                                Filesize

                                4KB

                              • memory/1672-88-0x0000000000400000-0x00000000004CD000-memory.dmp

                                Filesize

                                820KB