Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 22:21

General

  • Target

    3fbc4b6cb8977111fcaec9f373a91eec.exe

  • Size

    573KB

  • MD5

    3fbc4b6cb8977111fcaec9f373a91eec

  • SHA1

    2987907302771d4ce9c974a185877809a8de8ba9

  • SHA256

    10e2e858fe3a3d4ce8817d60085d6db79e76c44296ac8e7e72cd8e9d9a5b3e5b

  • SHA512

    833f3edc946a0dc276a4957d2d8cd6ebd8e340cddcc11a61d7d078678eb6c949094ced3b9fcb608cacaec54ce9ae1249ab013288752e42957a322bea9bf9d74a

  • SSDEEP

    12288:OcoGrzFLTcLNmQYb72ZuEXQk94UbQhvCvLti5YhMnpNNf9Z:O/8xhQYbCbX79z64tiCu/fv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fbc4b6cb8977111fcaec9f373a91eec.exe
    "C:\Users\Admin\AppData\Local\Temp\3fbc4b6cb8977111fcaec9f373a91eec.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\bcbjcabedghd.exe
      C:\Users\Admin\AppData\Local\Temp\bcbjcabedghd.exe 9-4-1-1-0-0-2-6-1-2-4 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703866273.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703866273.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2900
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703866273.txt bios get version
        3⤵
          PID:2544
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703866273.txt bios get version
          3⤵
            PID:840
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81703866273.txt bios get version
            3⤵
              PID:1744
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 372
              3⤵
              • Loads dropped DLL
              • Program crash
              PID:2632

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\81703866273.txt

          Filesize

          66B

          MD5

          9025468f85256136f923096b01375964

          SHA1

          7fcd174999661594fa5f88890ffb195e9858cc52

          SHA256

          d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

          SHA512

          92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

        • C:\Users\Admin\AppData\Local\Temp\81703866273.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\81703866273.txt

          Filesize

          58B

          MD5

          dd876faf0fd44a5fab3e82368e2e8b15

          SHA1

          01b04083fa278dda3a81705ca5abcfee487a3c90

          SHA256

          5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

          SHA512

          e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

        • \Users\Admin\AppData\Local\Temp\bcbjcabedghd.exe

          Filesize

          828KB

          MD5

          3293dbc123909dfc4b3698eea56d161b

          SHA1

          02c2c8647c644ea436bc68ac8e0c74911d96c75c

          SHA256

          f91309a4cc317ff5ad03b7c17c54adfea77e1f47e1fa4cf734b0c092d6bd231d

          SHA512

          86d1ec41678690764e1a9e5d5fd40d459a93e94db46bf1da2a09fdfb97d4580dc2fb598a2b03bdab79355b2bb0c3295ddd48d92fa74236b854612b9b7c68270b

        • \Users\Admin\AppData\Local\Temp\bcbjcabedghd.exe

          Filesize

          556KB

          MD5

          98f2e90af1894b47efc31be759c28bc9

          SHA1

          39247f59dd2aa38154143943a25a55551ca7d764

          SHA256

          2a18dfe6380190e4398cc7700b2f290921d9b10ba765ca33670797b7c4c6bf87

          SHA512

          5d424288f30b880f862e7174e2f3460d283cd7f95a1be34501dce3fb9f7c1bbd26c147eb6072b2410d7538a4541f5cd8518f3a843c08427a47e933b646cf7787

        • \Users\Admin\AppData\Local\Temp\bcbjcabedghd.exe

          Filesize

          605KB

          MD5

          9d43fbb0a3c922469d2f06f3cc895bb8

          SHA1

          4f7554e36d6ca5ca877f9cb07266f53f7c5c20d5

          SHA256

          30bf517129870dc055ca0e135f2347e9dc17d39c187abe84737bcfe4e169342f

          SHA512

          1772c3b33eb13af125c0d5866d7397ae698d19b2002311420ddebfa6f83f78ff6a2a8c697fe052865889746debf948d32e0e56e9239305c29609474f84e7ac20

        • \Users\Admin\AppData\Local\Temp\bcbjcabedghd.exe

          Filesize

          587KB

          MD5

          f7b407549d3e44fbc228680586385bdf

          SHA1

          5ae728f2ec651daaae3bcb5a6a4702b2c264493a

          SHA256

          468e408df866ab82d3deed293548feaef3e0212b8be581334779f0a0e8b1c524

          SHA512

          ad19043baab148840bda0fbccf1f5151de201d6207065ce123301ce318ccbd40d83f9c90c5b8a48eb2c0ebfe6a4e072f22545ef44a7abbb03f12f823bc9c5fbc

        • \Users\Admin\AppData\Local\Temp\bcbjcabedghd.exe

          Filesize

          663KB

          MD5

          0d889936fd00daa47f6b9a0c12195249

          SHA1

          bf30d32415b72e6196be1ddd0130d4f9c0212952

          SHA256

          a1e944d200ea7e414e8e6d8ac1403a94fae717278ff62fef473ba3acc002a92f

          SHA512

          d52fec665354dafed9752408c43787dde7802febeffa5c1345e0be344c81a9546e48953536f54866dfd3cf8cb379f859de988a6293dd017c60b84957efbcf703

        • \Users\Admin\AppData\Local\Temp\bcbjcabedghd.exe

          Filesize

          706KB

          MD5

          6703868b4991a3deea3ea89ba7509260

          SHA1

          dac85c7215ba2acd8c76c4089336f4b40f90cbb8

          SHA256

          4675ca8d6ae39817f67a43b3364b8b3385030914aa4bb143b7a92641a4452b84

          SHA512

          25fd21a9cac6b274dbbc93d35b6ce88ac783235bb6a83d6da3c3d94ecf833f784493e811857d85901a3d45ed693bb5762ce5e9a2462e945031868275b8c8e704

        • \Users\Admin\AppData\Local\Temp\bcbjcabedghd.exe

          Filesize

          303KB

          MD5

          d21e9e97a73332f43c40f231d0f4a8d3

          SHA1

          b697522464ad63de17bf253c5873ad3471ddfbf1

          SHA256

          8448ab9844140b8859a0d339e63db14761ff1039d69d90cd20e2202d1811af14

          SHA512

          d39e5ec119aae09028f9c1f6bcb5d5878b1e5a6594cb86eac549130c5ac79ec8eeb0225900eb91dfe2a8f5aff7bd44bfab731b1fffbcd05b66bcd3e7d4235bd4

        • \Users\Admin\AppData\Local\Temp\nsd2E90.tmp\ccf.dll

          Filesize

          104KB

          MD5

          c87a0ea6f1d3bd17550b6df561cb3246

          SHA1

          dea66f545f92acd8e6fb7d0279d9226640e11148

          SHA256

          7a5ea04b32a29da1ea26936ecd7bad4ebd05414bda8a03e92e5277ab5ee6fdda

          SHA512

          be97a43838caa2159a3588f54a929d57b9cd60e54d7b3c4b3d753d27172215638837cf3647e46fde11a3836ad23677d1bb1b98fe6089793383228e77edc7427e

        • \Users\Admin\AppData\Local\Temp\nsd2E90.tmp\nsisunz.dll

          Filesize

          40KB

          MD5

          5f13dbc378792f23e598079fc1e4422b

          SHA1

          5813c05802f15930aa860b8363af2b58426c8adf

          SHA256

          6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

          SHA512

          9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5