Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 09:05

General

  • Target

    13ced7acc5bb6721c7f159e4ab931be6.exe

  • Size

    648KB

  • MD5

    13ced7acc5bb6721c7f159e4ab931be6

  • SHA1

    3abf24248b18a1c16d52496e89f92206770bf955

  • SHA256

    ae59b101c393e999a16cce8b8360143df861c190b0ccff9c5c3c426930069ba6

  • SHA512

    95fb75df0396c98f9746ff713a7d5fbabb9076fea4f2bc251d3b2aad6ff543dbe4a52a4714e66216d3ffc4bf8e16d8207adb8a9ea6e809c9d7c54d85db8db2c0

  • SSDEEP

    12288:8Wi8Fs2pPcx5AL6AnR9SUCnp4XS3h1GvLzZUBlG7B6QfdhjeobIN:8W3VPcHq609LqKSR1QZtsUrV4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13ced7acc5bb6721c7f159e4ab931be6.exe
    "C:\Users\Admin\AppData\Local\Temp\13ced7acc5bb6721c7f159e4ab931be6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\1430995618.exe
      C:\Users\Admin\AppData\Local\Temp\1430995618.exe 9,9,4,1,6,5,5,1,2,7,9 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544472.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2284
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544472.txt bios get version
        3⤵
          PID:2512
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544472.txt bios get version
          3⤵
            PID:2840
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544472.txt bios get version
            3⤵
              PID:3496
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544472.txt bios get version
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2456
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 856
              3⤵
              • Program crash
              PID:3004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2636 -ip 2636
          1⤵
            PID:2336

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1430995618.exe

            Filesize

            359KB

            MD5

            199bac12d320e654c7031c052b7fbdaa

            SHA1

            470ef753f3da70f9e2616c665d71903c64f80457

            SHA256

            b0d0f1b85b0afce61553611b7833dac07a887e34d6d0de5d89f7c0dd3e4d6c11

            SHA512

            9c52356006f97f76c7c615bc8b349d2426d89c60c62071231f0c7074ac7eff3451d4a00eccf34e52a85e8db1e8980b06ba50f15cc658b5c34fc80f2fb22bdb56

          • C:\Users\Admin\AppData\Local\Temp\1430995618.exe

            Filesize

            348KB

            MD5

            d8f1e459083d2508d5e12446b94bb910

            SHA1

            399a3be88513c105e624f7a01b53970e2acf263b

            SHA256

            fdc91d54fb4810d5eae0dd64fc4d2c7b5a769259884f8f96ff662323f6b8c305

            SHA512

            6fc51a10bd021e76c55160585cc8c62c90d9384f815569023c125163839628abdd8a2af983d6c83134d26e3e86c7a657047d11cbf99e41e447276c32b0811a25

          • C:\Users\Admin\AppData\Local\Temp\81703544472.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81703544472.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81703544472.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\nsw4B71.tmp\mfpwdjk.dll

            Filesize

            153KB

            MD5

            99aae300d3c45b8cf92128cbd75efca4

            SHA1

            46f2b7cdf7cb6960d9541c44ee83682f9d88044d

            SHA256

            85b3947c480530b6e31be39852146191621ddc99c34df1d12274c7ddf88aeff3

            SHA512

            e37777e98a2d7386267b74008aa4564aa1d0ec40d6fd12bc91e6156b7bd0d3fca18fbeb7dbd8e7840b8ceae6fe6cb31f73117f821b0685e0bf9bd7ee670605ce

          • C:\Users\Admin\AppData\Local\Temp\nsw4B71.tmp\nsisunz.dll

            Filesize

            40KB

            MD5

            5f13dbc378792f23e598079fc1e4422b

            SHA1

            5813c05802f15930aa860b8363af2b58426c8adf

            SHA256

            6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

            SHA512

            9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5