Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 00:54

General

  • Target

    1e71ff872199864b856503a8972d658d.exe

  • Size

    3.6MB

  • MD5

    1e71ff872199864b856503a8972d658d

  • SHA1

    424929f8685948678b8a7ec501081fbd7a37277b

  • SHA256

    12c1a04a01b2a50126523be7f39bea8afbd17786104e1111628ffb953f2dee2c

  • SHA512

    00f6a588adef8a86697d5e1c1b22101d7aee983c70462ffb28c5887d9a5f8f76a6ad660d81149b09649be482a7d1601578d64869dbc0cf0fd2c44d420b362382

  • SSDEEP

    98304:1u7AEvgVOhaHaEtPW/w2mCzdccnaZjwEktE:QAEvgVOhoD66c0w3tE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe
    "C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\is-6VRUU.tmp\1e71ff872199864b856503a8972d658d.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-6VRUU.tmp\1e71ff872199864b856503a8972d658d.tmp" /SL5="$5014C,3509953,66560,C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe" /path="C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe" /pn=mf
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-6VRUU.tmp\1e71ff872199864b856503a8972d658d.tmp

    Filesize

    701KB

    MD5

    5d66e66c72bb42c3f33d3ac15acf1445

    SHA1

    011ab6d35c38f292f65d3904a81a405fe33e7868

    SHA256

    928c908d46e033a2e973d536f4aec718edcd7f214376010cd28567d05174cf98

    SHA512

    3061de25914b17908f2d6d3a85c30f0b3d75a06d866c528c273132b84933b0ee180b13ae95472e80bff9487c875763fe08351ccb30535d00935eb04b0f3b1e10

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\7za.dll

    Filesize

    278KB

    MD5

    17bddadca7044cc7b8406f1ca45210df

    SHA1

    d74c5236542f4ddbb50cd113dedcd05aa9861ca9

    SHA256

    4406dc1789f1ebdbfebb7796719d21dcce2250f3a0a07f204cfd0b4f93725f6c

    SHA512

    1abf4e41912e18b77f7e0ea7ce98e0a5760a554cf79c78dd8ccaf04589fc02579b0fbb5a822acf2d098c2362b778821b1e5e870a55cba5834566a723c0716d50

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\acnt2010_R.bpl

    Filesize

    954KB

    MD5

    2a241eb0bbb0ef2dbbf825df5e8f89aa

    SHA1

    3cfd7d52897353e973edbab0dd17340b339e315b

    SHA256

    a1ad131f0d00303f79fc554c29e8755159c10bba04d60af692725afe454fdd0e

    SHA512

    c4e8531a7daeeab7d4a2c51b29e73e4987985d68a90cc2d56925e7ae0a10677af9b1f3d87c4db0ac527d9189d809a4082e11ca5249e0460f0eae9ef8ad01f045

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\icon.ico

    Filesize

    16KB

    MD5

    bfd597993cb526fe250354c2ba25cfae

    SHA1

    86f937a5e3b5a33ce3e316a859e9c41369cabff1

    SHA256

    0f26ffd402d1a924002237d32305f8cbfec35b493f8e52fa23d643d1a9e1036b

    SHA512

    295441c5427eae35aeac11ce95758ec1ca4333859b682b05abfb41c252bd5967bd1f62432416864c4fdfb804d81090227b032efbb44a1d4e0e8d315ce7ba4d5c

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\mfwinew_ligth.asz

    Filesize

    47KB

    MD5

    36f04b5f9dec355fc9bf5b31c63b35ec

    SHA1

    df74da236b3ad034d9abe2573f7bfbbab1cfc6cb

    SHA256

    10d7a315811cd6dfdd309a198527d075ae4b59018988488075f017f5400cf081

    SHA512

    fc9fbf34673babcbd85fe959906b81e7d71bb258eeeb669e6f156e1efe3967bcdefd2ce1d5d1a4fb8278272e92d040e842d666a82f6f3f851174cc5521a6d3d4

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\rtl140.bpl

    Filesize

    497KB

    MD5

    4500147351f56ac68e11b29404e9af83

    SHA1

    b15747f80019e3015bc2e87054927d980ecef2c4

    SHA256

    ce905c3d43cfab2bc6800d85d41e9540a2911fa5b81896a6137259909693585f

    SHA512

    9ee20d5ee4a18b41fe4064bd43cfaf0d591441c3d38fb2783cc735a99b7126afddea19a5728c86e271996c61ae20d768e5e58515016f39dd5bcac0fd3befaa2c

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe

    Filesize

    1.3MB

    MD5

    a8a1891ddf33206551affb78d7b5b34f

    SHA1

    39034c35b5f05c438e4be431ce4a300dae893954

    SHA256

    1df7caf8c51e1e2fe4d139c9cae5dce491f6bc063da2ba3e4e14b7acee1c8562

    SHA512

    95dca1648a54dcbc4a6f937fe866215dba507bbbed227d865b3f452682ed0d020cd5127deee79a0cb996207e752b9d9c4b06a45298c3d47162b497b1e4f39d1a

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe

    Filesize

    475KB

    MD5

    e0ce7003c1cb47e874fbf27fcbbb67dc

    SHA1

    4f89389dd99384f291cd6d2563487aba8af77b71

    SHA256

    b2b0444225cc1461bcbf9c1cb71f776c3dab6c4e397ce1be279f36fa6e2187ee

    SHA512

    8cf6ce4d67eed64ece5b6b27e5a7c1c69f8166c1be9d5dc2aec85ad7cac9d76d8c09c9b31c059682fef9023e4bfcf2c340cc2c4e1e25f6efaf61b87d3970f357

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe

    Filesize

    1.8MB

    MD5

    2d6ddef47d807fb83dae21dcb8e33521

    SHA1

    7cfc94c90e30fe9d7b6922c35c7491c73c421a9a

    SHA256

    92c8342802935767887dce60965bc2095b036746b46482d230a02fd941929c26

    SHA512

    243f3b1ddc1b58b51f17d211b5729c3d7cd79b42bd2d3aecf193447d671f61eac44180eba321d7b73b9c2f887f39151bede05c61f597eb0520e46e31536b955c

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\vcl140.bpl

    Filesize

    208KB

    MD5

    f01e923f185b466c9c7a830c1f930179

    SHA1

    f11eea76a5572a576141919587a1f23086337afc

    SHA256

    e9f781af984947fc60f532cd709df5074678c9eeff9c9d3efd358759484de46a

    SHA512

    b4f1c4a3d242805a9fcde1291f4450ece64ab5ff9b35d622352af0e919adf003002e4194318053179de0a7ef9ac308380e14d82c4bc89b5411bde6148923ce81

  • C:\Users\Admin\AppData\Local\Temp\tmp2023104041\vclx140.bpl

    Filesize

    231KB

    MD5

    915c4089431be3bc007dc7cd26b722e6

    SHA1

    d827fa0851e2b6a533b891f5119961d1696d6ff1

    SHA256

    0901f66236b8956ae467240a125d1d938f523938087eabc9df3fa51a873af5cc

    SHA512

    07079b0b195982c2ca5583844ee1f36b479b06458dfcbf24df8f07aaf74ebd5ad3758989de670897dfa9508ede540998ebe2ed60a3cee04c0e9b358bb1f6f1ec

  • \Users\Admin\AppData\Local\Temp\is-0HSTD.tmp\_isetup\_iscrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • \Users\Admin\AppData\Local\Temp\is-0HSTD.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-6VRUU.tmp\1e71ff872199864b856503a8972d658d.tmp

    Filesize

    411KB

    MD5

    4c204b2ec38b7f6fbbba89415f7cd545

    SHA1

    27dce5331e1cdeb7b28ea8b67d0ee16e85030fcb

    SHA256

    7759a256f6eb68f800d8462c5c48ffd53f3601a328d2602f4ecd2eca4f2f579b

    SHA512

    3106791e0dcedd7cca3cce7428eec843c0ed5698c5d33397d6f0e9b6c6bcc51bb7e7d21d99c505323ff213df8427a60ffa47e1d94fa92fb26c9319ddf64e7f06

  • \Users\Admin\AppData\Local\Temp\tmp2023104041\acnt2010_R.bpl

    Filesize

    1.8MB

    MD5

    861e95d0762b67f598f84c188f950a06

    SHA1

    90e4491dd5b4fdb3dab1dcb53804e77f8884c0ea

    SHA256

    67dfb86cf80616d7b7a2860b2a9270045a92f574bc3ad73750d2b9d0676bf29e

    SHA512

    a963725bb7eed970b25a20084a4de085fe37819274e1e88daae1d939cafa027bfe4a8d747382bbce62de60ee3c24367ebf757918d6a137641f9d51b7aa614b77

  • \Users\Admin\AppData\Local\Temp\tmp2023104041\rtl140.bpl

    Filesize

    250KB

    MD5

    6c30c2abb64593a0e6d7e3abebcc0fbc

    SHA1

    0635ed5b8bbda29842e86f123bbb7a5207fb6cfd

    SHA256

    be7ccf6430823e7e11d624c4d90975306570f899cf36c873ae3ee767d3bd9944

    SHA512

    31be574b6102b25f82c798385183c378bb9bb013c096c609f713a64095766164d1983d60dbeac80858402239c31fdd9a52c1bddb5b40cbfda70193c6400cb24e

  • \Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe

    Filesize

    1.3MB

    MD5

    ac40cf3d4f0ff8567ac33b5ad6806731

    SHA1

    878c1936f784843a271a7ed5703827261471c9d7

    SHA256

    5fc02826456e360f064411b0843c8857777bbdbed7eb7f7a9bf7df520714b3b6

    SHA512

    b827ce1dda62dc8e30ebb45a8dbc28972cb1cfa944033511ef0f302979dc2e6b71aa73380e00cc4647531177edb427803d3a57f4487487fb236a5175573afb98

  • \Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe

    Filesize

    1.4MB

    MD5

    743e840e8f8355be93ad18eb504ee96f

    SHA1

    d279c633a2fa5bb86ded2bdec58815e92a1c902e

    SHA256

    17ab637d85fb33b2301e57a9c8d75f9e26d513565e1312621138eba3139a201c

    SHA512

    ba1e403d1fe9ab809c0bc407fc101391e91774ce35db3d9fcceab206bf176ba1cd6ee7f1d3de31dba6ff41d585b3620d2bcca7873fc37b7a3aad792c0ec50654

  • \Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe

    Filesize

    1.1MB

    MD5

    c38078f2860b643a3dcc8776281b645b

    SHA1

    73bc061124da4643e7dfc26f36d99ca71f9de83a

    SHA256

    e77f2cec060702fb6ba95be619849d11faa8280a7588eee7983a7409bd515f95

    SHA512

    3025297dbb0a3548fc2462a9bd19d3ba58beba38236eb794f1168876932c6db81e47b46865b0c3fe4de300e268b8ddf13b6bd7bb441036758366c5ab6991e443

  • \Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe

    Filesize

    1.0MB

    MD5

    bfa79f126429d9cf35f6685612cdf5d6

    SHA1

    be234c6f1b0dc05b1e772258c7d35e60e51fa549

    SHA256

    9bb7fe055610277eb877bbc574021c8113c5c38af9dead1a0b3a0e4fa1ac272b

    SHA512

    76b7adc1d33f110ffac899d3e94565036d5c398070bb8a7f89142e7f48c40d191b77809ce5798975a836d88a56eff52268447c7c110103de62bf94c28a95c222

  • \Users\Admin\AppData\Local\Temp\tmp2023104041\vcl140.bpl

    Filesize

    238KB

    MD5

    753a4c1c832be4eb1bd5b3c5ebec40f9

    SHA1

    5a251fb267facb050aa327ede3597d43c0304abb

    SHA256

    e0285dc9c9ab8b22defb23bdc3252cfadad0e778288217d3bd17f3e645f3cb6f

    SHA512

    608b475c3779718bb7b61f9a12249435f9f37fa6548e79f3a468c46fb6de048f8d9972003e05474146dd920592c7bff4e855e38d468451dadd9687bcb9ad0011

  • \Users\Admin\AppData\Local\Temp\tmp2023104041\vclimg140.bpl

    Filesize

    313KB

    MD5

    857ff40279ccb43d083974c0f19d98aa

    SHA1

    cb3f41caa047f3d9084a6f90d191dadceb81a1d5

    SHA256

    4316db5c1bd19a4c77913c9f1327be1d5d5b2f8f96087c7e6b51ffb8cc275eb7

    SHA512

    b2b0b1f0ccf9d4aee0b286781aa94b419cb3bfe5016f2cab109785e6f9d7bb4c7ca961807306bb99ceefcdb27356ea2aaf03b7869d768c324a00540f7f85b112

  • memory/1616-180-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1616-7-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2168-183-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2168-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2900-202-0x0000000040830000-0x0000000040884000-memory.dmp

    Filesize

    336KB

  • memory/2900-194-0x0000000040830000-0x0000000040884000-memory.dmp

    Filesize

    336KB

  • memory/2900-193-0x00000000006E0000-0x00000000008BB000-memory.dmp

    Filesize

    1.9MB

  • memory/2900-203-0x0000000050420000-0x000000005045F000-memory.dmp

    Filesize

    252KB

  • memory/2900-191-0x0000000050000000-0x00000000501C0000-memory.dmp

    Filesize

    1.8MB

  • memory/2900-190-0x0000000000400000-0x000000000066A000-memory.dmp

    Filesize

    2.4MB

  • memory/2900-187-0x00000000006E0000-0x00000000008BB000-memory.dmp

    Filesize

    1.9MB

  • memory/2900-198-0x0000000000400000-0x000000000066A000-memory.dmp

    Filesize

    2.4MB

  • memory/2900-192-0x00000000501C0000-0x000000005041C000-memory.dmp

    Filesize

    2.4MB

  • memory/2900-201-0x00000000006E0000-0x00000000008BB000-memory.dmp

    Filesize

    1.9MB

  • memory/2900-211-0x00000000058C0000-0x00000000058C2000-memory.dmp

    Filesize

    8KB

  • memory/2900-212-0x0000000000400000-0x000000000066A000-memory.dmp

    Filesize

    2.4MB

  • memory/2900-213-0x0000000050000000-0x00000000501C0000-memory.dmp

    Filesize

    1.8MB

  • memory/2900-214-0x00000000501C0000-0x000000005041C000-memory.dmp

    Filesize

    2.4MB

  • memory/2900-215-0x00000000006E0000-0x00000000008BB000-memory.dmp

    Filesize

    1.9MB

  • memory/2900-217-0x0000000050420000-0x000000005045F000-memory.dmp

    Filesize

    252KB

  • memory/2900-216-0x0000000040830000-0x0000000040884000-memory.dmp

    Filesize

    336KB