Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 05:36

General

  • Target

    087a8101d38fa364ddf1b2c248494788.exe

  • Size

    696KB

  • MD5

    087a8101d38fa364ddf1b2c248494788

  • SHA1

    479e880862dd54d7d45145208dba3c2a494fab52

  • SHA256

    bd2234a31a15f31b0afd9ed6db59767482c4236db557e58f6f7fb2f92b88fb8c

  • SHA512

    2d9249405bf4f5e69f3610e5a109450cc56c8fe75e5aad919393ff1d96ef4571bfd60d9f16151738eb1b0f60b1d14f768407df047d812336f2076ea2f85bccf2

  • SSDEEP

    12288:nwYrzpGLVyD/E23EDF5l8gVCtfad1Fi9OgJPFj8HwuRrM8b+6QSTccnxXo:wAzpWEf0DFEgEtSd1I9zJtj8HwutMhi8

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies WinLogon 2 TTPs 7 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\087a8101d38fa364ddf1b2c248494788.exe
    "C:\Users\Admin\AppData\Local\Temp\087a8101d38fa364ddf1b2c248494788.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Modifies WinLogon
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4580
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\tdev.dll

      Filesize

      93KB

      MD5

      d8cf6b0590d7fcb85195885767ecfd58

      SHA1

      071799f0ddcdabe670f00516c47d511e8ae2a46d

      SHA256

      26665f47c302d145b717ce194867299b6454aa699fc737639eaf56d57f1a9272

      SHA512

      5ef690f67dab3fd9ab8bace6063094ed1666dfb2445ad33570a3f70a9d0cd7cadd8ab9ec6dd0fcc0e25f974540a587b13d707c62db0d6a274d952ca9dc21eb69

    • C:\Windows\SysWOW64\tdev.dll

      Filesize

      91KB

      MD5

      1c6259db282ce7d80777aff57331f746

      SHA1

      f74a0a52c7d944f45f56b224b1caca64b98f1b8d

      SHA256

      600bd1d3f56444afe93ca67fa82b5e20db77d42e3c461f6da15922253b368c19

      SHA512

      08be444c56baec147ac122f8659c6140ef012c865e56b66a63d524ddb9a3536bc57e007185ae84a3a6bc97c3c11c83fbb4a7d994146076578b5da48fe3ca6934

    • C:\Windows\SysWOW64\tdev.dll

      Filesize

      92KB

      MD5

      e9674516aebeca24c5c366af96e10d05

      SHA1

      de9b775edcb5ddf5e7cb8691ef002547a1a48a29

      SHA256

      af6d7faa1d9f9a0a5ad16628869322416972afdd7c9563405eb990285b49acc0

      SHA512

      487cc1d79ed663e3fd89972ba944532f9dfb5a3bc80eca2293e9274feba8b847828fcd1e667116a2ed2544bddf92c3672338fef78a12928248d55cfb8897e71f

    • memory/4580-0-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB

    • memory/4580-12-0x00000000022E0000-0x000000000238D000-memory.dmp

      Filesize

      692KB

    • memory/4580-15-0x00000000022E0000-0x000000000238D000-memory.dmp

      Filesize

      692KB

    • memory/4580-14-0x0000000000400000-0x00000000004B0000-memory.dmp

      Filesize

      704KB