Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    170s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 20:19

General

  • Target

    106ce9f941d28e6d18ebea1ba1cedee4.exe

  • Size

    567KB

  • MD5

    106ce9f941d28e6d18ebea1ba1cedee4

  • SHA1

    f0f3be3e6e0d133a46910b1c1562dad91e5218e0

  • SHA256

    225776aa635fa530432abbee4c30760fc748a5a7d0b2668059287f702afed484

  • SHA512

    0276a3247c12fdbf3f73416182ccba1884301ce54859630ccb5749a5fb71780e8e9ee18e39902ba52d15a5c6914511a238fb616ad356936e9c1e5aded2ee47ae

  • SSDEEP

    12288:RSqCaEZZ2TusjEi3fLuSv1UFEyt652c5phCX8xvNkmw1cBYV0azPVc:RSnsusl3ThvuSX2AhCs5Nbw1cCV0azO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\106ce9f941d28e6d18ebea1ba1cedee4.exe
    "C:\Users\Admin\AppData\Local\Temp\106ce9f941d28e6d18ebea1ba1cedee4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:440
    • C:\Users\Admin\AppData\Local\Temp\ecfcabfbcibf.exe
      C:\Users\Admin\AppData\Local\Temp\ecfcabfbcibf.exe 3]3]4]3]8]2]0]4]0]1]4 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703515915.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3268
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703515915.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:772
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703515915.txt bios get version
        3⤵
          PID:2000
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703515915.txt bios get version
          3⤵
            PID:3920
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81703515915.txt bios get version
            3⤵
              PID:1200
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 856
              3⤵
              • Program crash
              PID:2956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4204 -ip 4204
          1⤵
            PID:4756

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81703515915.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81703515915.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81703515915.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\ecfcabfbcibf.exe

            Filesize

            764KB

            MD5

            56e6f7c16992d8b2f5912ba01bfe93ee

            SHA1

            c2c33e2445618d79aa4920acb862d533c5a153cf

            SHA256

            5a930fb5a147e14030be8ea9e869b61b236ae100559a7825637f6512c0386463

            SHA512

            8dbce6daa39070549110e426f9a5f879a25c2764787931f812ad6501b45e93d8fc9d20e183e10364f29ad73c59cfd01fd9bb8acbd69d23c59b736cd40deececa

          • C:\Users\Admin\AppData\Local\Temp\nseEA03.tmp\hyulanvh.dll

            Filesize

            107KB

            MD5

            9080b78b9a4590a6e43e41468a387819

            SHA1

            d79b2cfec3736bf6d58f627aeaad43ad75d9e142

            SHA256

            7c82ae5664963f23bd03b09fbcc5978295f482357f4c0c9f9af09828e7fab67c

            SHA512

            6f6ac05e8bda7936d9eeba49200041fd70a6b26964dc2f598fc1cc6680217b32eedd3652a9015713c182d660ae838b1f410644c56edac642649f6d03d2eb834b

          • C:\Users\Admin\AppData\Local\Temp\nseEA03.tmp\nsisunz.dll

            Filesize

            40KB

            MD5

            5f13dbc378792f23e598079fc1e4422b

            SHA1

            5813c05802f15930aa860b8363af2b58426c8adf

            SHA256

            6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

            SHA512

            9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5