Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 09:05

General

  • Target

    13ced7acc5bb6721c7f159e4ab931be6.exe

  • Size

    648KB

  • MD5

    13ced7acc5bb6721c7f159e4ab931be6

  • SHA1

    3abf24248b18a1c16d52496e89f92206770bf955

  • SHA256

    ae59b101c393e999a16cce8b8360143df861c190b0ccff9c5c3c426930069ba6

  • SHA512

    95fb75df0396c98f9746ff713a7d5fbabb9076fea4f2bc251d3b2aad6ff543dbe4a52a4714e66216d3ffc4bf8e16d8207adb8a9ea6e809c9d7c54d85db8db2c0

  • SSDEEP

    12288:8Wi8Fs2pPcx5AL6AnR9SUCnp4XS3h1GvLzZUBlG7B6QfdhjeobIN:8W3VPcHq609LqKSR1QZtsUrV4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 372
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:1488
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544494.txt bios get version
    1⤵
      PID:1988
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544494.txt bios get version
      1⤵
        PID:2592
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544494.txt bios get version
        1⤵
          PID:2516
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544494.txt bios get version
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2904
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544494.txt bios get serialnumber
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2736
        • C:\Users\Admin\AppData\Local\Temp\1430995618.exe
          C:\Users\Admin\AppData\Local\Temp\1430995618.exe 9,9,4,1,6,5,5,1,2,7,9 JkdFQzcsNDI0LBcmSlFBSkQ/PC4ZJkU8UFZJTUZIQjYoHCksb2xqX3RhbWVYZGE8TGBkbF9gXBcmQEhNT0RDOysuLiguHyk+REM7KRcmR05OPlA+U11COzQpMjguLhsuUT5JTTxOXk9NRzxmbWtnMSsubW1xLUI+SkIkUE5KKDxPTidART1LHyk+R0hBREA7NBwuPiw4LC8ZJjspOSwrGypDMTYkKBcrQy44KDAeKDssNCkwGipLUU09TDpLW09MRFFAQVI0FyZMUUk/UEJSWDxMQz08GipLUU09TDpLW007SEA8Hig8TzxbVExHOB8tPk88Vj9MPkdETUM2FyY/S1JOWj1RTVBKPEk5NBoqT0c/R0JQRlFeT01HPB4oTUQ0Lh8pP04wOxkmSUxKU0NIQF5VPkM6RklEQ0g8RkNOSUM0HC5DTlpRU0dLQERBPG5tcGQeKEk8S1FRSERJRl1OSjxJW0M7VE48MBkmP0BARFI4LB8tQkpWO1VNO0hEQl0+RTpJVU9OQD88ZFpjalwcLj5KUk1KSDg7VkVPNywrOCwwLyUqMy0xLxsuUkJEPDQtMy0sLDA2KSkpFytDSVJJS006O1ZLRUw/ODAuNigpJygxKTI1LzY4KSkhR0kfKVA8PB4oTElDOWdub2skMVocKV0hMWBiYHNwJ11gY2E3XmBuanJoZyVaa2wfLWFRc2dLYGRhQ2lyaWttWltEWGpgYWBtXmJeZ2NmdSQsYS0xMCspKSkuMSwtLTEwHildW2t2aGdqYGJmWGVYY2RsIC1lZV5rLC0hMmBrIDJiKjAqLS8kLDFfJDFdKS4uLTEfLTFrIyxbKS01My0gLTVsHipbKCdvbGpfdGFtZVhkYSQtX01kZ2ZYXlwhMTBhZGtjZ1hkXCEyXk1gaGtaXlw=
          1⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2200
        • C:\Users\Admin\AppData\Local\Temp\13ced7acc5bb6721c7f159e4ab931be6.exe
          "C:\Users\Admin\AppData\Local\Temp\13ced7acc5bb6721c7f159e4ab931be6.exe"
          1⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2140

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\81703544494.txt

          Filesize

          66B

          MD5

          9025468f85256136f923096b01375964

          SHA1

          7fcd174999661594fa5f88890ffb195e9858cc52

          SHA256

          d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

          SHA512

          92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

        • C:\Users\Admin\AppData\Local\Temp\81703544494.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\81703544494.txt

          Filesize

          58B

          MD5

          dd876faf0fd44a5fab3e82368e2e8b15

          SHA1

          01b04083fa278dda3a81705ca5abcfee487a3c90

          SHA256

          5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

          SHA512

          e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

        • C:\Users\Admin\AppData\Local\Temp\nsy7041.tmp\mfpwdjk.dll

          Filesize

          153KB

          MD5

          99aae300d3c45b8cf92128cbd75efca4

          SHA1

          46f2b7cdf7cb6960d9541c44ee83682f9d88044d

          SHA256

          85b3947c480530b6e31be39852146191621ddc99c34df1d12274c7ddf88aeff3

          SHA512

          e37777e98a2d7386267b74008aa4564aa1d0ec40d6fd12bc91e6156b7bd0d3fca18fbeb7dbd8e7840b8ceae6fe6cb31f73117f821b0685e0bf9bd7ee670605ce

        • \Users\Admin\AppData\Local\Temp\1430995618.exe

          Filesize

          928KB

          MD5

          cdc736e0f419328a520686337059422a

          SHA1

          4e62d9bb159ddba558c607398adee7f8e5fe7eb9

          SHA256

          304263d7a4374aeb5505c5a8c7811e3db48fd6b7db775a19f87f83b3b088d70c

          SHA512

          cb92774f0fe2df891082daac52171223fd58b2a14b4bdc333cfb83a7d699829cb3bc31923f7470b8c27d38ff85bacdff78ab2f6859d14372a98f5659a23b47a7

        • \Users\Admin\AppData\Local\Temp\nsy7041.tmp\nsisunz.dll

          Filesize

          40KB

          MD5

          5f13dbc378792f23e598079fc1e4422b

          SHA1

          5813c05802f15930aa860b8363af2b58426c8adf

          SHA256

          6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

          SHA512

          9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5