Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 15:52

General

  • Target

    Photo01 By ‮‮‮‮gpj.scr

  • Size

    547KB

  • MD5

    dc5e556beac206f025de1c9f92d2e39b

  • SHA1

    c0820fed333a9bb3c800950e5d3f46b0ade731e0

  • SHA256

    560e31e0a9b21391f252a3096e2e0e495eb7c33a7548de1d71dea1a334536aee

  • SHA512

    4f34c33157fa78e7d068480962ad30116673a62fff7591b95d245e3cdc56e218cb6c8cc63ad1930d555a033ce810ba929c9040ebcc7df61099f673fbb8e6b621

  • SSDEEP

    12288:oXTxe8fUp6qreT2A+FY0u7qMg+RIGjFGKOyeRJatK:xpVLqg+KW5b3tK

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Photo01 By ‮‮‮‮gpj.scr
    "C:\Users\Admin\AppData\Local\Temp\Photo01 By ‮‮‮‮gpj.scr" /S
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\Photo01 By ‮‮‮‮gpj.scr
      "C:\Users\Admin\AppData\Local\Temp\Photo01 By ‮‮‮‮gpj.scr"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Updbsp01.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Updbsp01.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Updbsp01.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Updbsp01.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2956
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2580
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\Photo01 By ????gpj.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Photo01 By ????gpj.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\Photo01 By ????gpj.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Photo01 By ????gpj.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2952
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2316
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\YICsc.vbs"
      2⤵
        PID:2648
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Dunkel.jpg

      Filesize

      25KB

      MD5

      c0445a9d363b4960d7085959be6dd62a

      SHA1

      3e859468f8524c9e69ddb9111a591b162a863878

      SHA256

      cf7203048cd517b7b7f1e567ce36dc7f24d3d3869049b34569ddad50493ff0d4

      SHA512

      2a4747361fd6eee5be02e1768696690220e80fda59024721ce6d197cf734e03530dc476e47403334ab7eaec80b9fd7ef3b0b040f740f6a75bb03846def201a8e

    • C:\Users\Admin\AppData\Roaming\YICsc.vbs

      Filesize

      399B

      MD5

      ce01be7699a958d0bc7ed4d3207b49d7

      SHA1

      006dd08cb31da33ab0f54baa30f8d28e34dd83de

      SHA256

      0c9b78079d5172366b8806bffcb293a7b42bf83850148e5509ebe566e01e585a

      SHA512

      7a0d92283cb9317bf99e14df7d8ae0eaa17af007177a231f974c95a924f67d2cd40600ffd051ef55eb6258720ebb8500b56e482d8e512b128eb184f2d0490c08

    • memory/1532-33-0x00000000006C0000-0x00000000006C1000-memory.dmp

      Filesize

      4KB

    • memory/1532-29-0x00000000006C0000-0x00000000006C1000-memory.dmp

      Filesize

      4KB

    • memory/1532-28-0x00000000001E0000-0x00000000001E2000-memory.dmp

      Filesize

      8KB

    • memory/2404-30-0x0000000074AC0000-0x000000007506B000-memory.dmp

      Filesize

      5.7MB

    • memory/2404-4-0x0000000074AC0000-0x000000007506B000-memory.dmp

      Filesize

      5.7MB

    • memory/2404-1-0x0000000074AC0000-0x000000007506B000-memory.dmp

      Filesize

      5.7MB

    • memory/2404-2-0x0000000000BE0000-0x0000000000C20000-memory.dmp

      Filesize

      256KB

    • memory/2404-3-0x0000000074AC0000-0x000000007506B000-memory.dmp

      Filesize

      5.7MB

    • memory/2404-17-0x0000000000BE0000-0x0000000000C20000-memory.dmp

      Filesize

      256KB

    • memory/2404-0-0x0000000074AC0000-0x000000007506B000-memory.dmp

      Filesize

      5.7MB

    • memory/2404-27-0x0000000004A30000-0x0000000004A32000-memory.dmp

      Filesize

      8KB

    • memory/2752-8-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2752-5-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2752-19-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2752-6-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2752-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2752-32-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB

    • memory/2752-12-0x0000000000400000-0x0000000000479000-memory.dmp

      Filesize

      484KB