Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 00:23

General

  • Target

    462507f254269c493bba5d6b953b6117.exe

  • Size

    456KB

  • MD5

    462507f254269c493bba5d6b953b6117

  • SHA1

    05a2ea36621beff172e1db99594dec2b679ea8a9

  • SHA256

    7b9a2506298ce1632a7f3233d5d83d22b89a257715204b1e64bfdf61784751c9

  • SHA512

    968722ed35e4ab6742e0de6f44407636750968a65d62ec8f88242b84eeb6dcc4204500608d05fafbb6f520623730282418aa14eff2f20cbc66a68ce38fd9bfb8

  • SSDEEP

    12288:z4ik34n1GxipPy4ZNj2mOb/DNlq41TzXe9Yv:z4ik34n15iN/5lq41Tzuq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 14 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 50 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\462507f254269c493bba5d6b953b6117.exe
    "C:\Users\Admin\AppData\Local\Temp\462507f254269c493bba5d6b953b6117.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\u8kSVi.exe
      C:\Users\Admin\u8kSVi.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del u8kSVi.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2568
      • C:\Users\Admin\heomiu.exe
        "C:\Users\Admin\heomiu.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2260
    • C:\Users\Admin\dlay.exe
      C:\Users\Admin\dlay.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2608
    • C:\Users\Admin\alay.exe
      C:\Users\Admin\alay.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2556
    • C:\Users\Admin\flay.exe
      C:\Users\Admin\flay.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
          PID:2992
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del 462507f254269c493bba5d6b953b6117.exe
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:3020
    • C:\Windows\SysWOW64\tasklist.exe
      tasklist
      1⤵
      • Enumerates processes with tasklist
      • Suspicious use of AdjustPrivilegeToken
      PID:2656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 88
      1⤵
      • Loads dropped DLL
      • Program crash
      PID:2444
    • C:\Users\Admin\alay.exe
      "C:\Users\Admin\alay.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2840
    • C:\Windows\SysWOW64\tasklist.exe
      tasklist
      1⤵
      • Enumerates processes with tasklist
      • Suspicious use of AdjustPrivilegeToken
      PID:1624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\heomiu.exe

      Filesize

      93KB

      MD5

      21ecd0513bd436bc1b5dfe710c6cc737

      SHA1

      a11a2d39cd7e5d37b94a8fd768bfa27334aa94c5

      SHA256

      90fad70b9e022dfb44c8b9c5da8456268b977cf957ef24842062e9d6084981d9

      SHA512

      62721629ce204ec007afdc65aabe95b655efa57fec3f697fc435505d0fa582fc238d439eb8727560294e537a53ec833a429e9e938978d93dba70a551cd7c801b

    • \Users\Admin\heomiu.exe

      Filesize

      92KB

      MD5

      b6e8f29c9f13f19f6ddd8b711e59ac50

      SHA1

      a64877f22eb33ff51d4253c228a22087fe06b521

      SHA256

      26dd333a87795d11d1422f8fc036da053896e44f5c2e89ecd763f544a2142f86

      SHA512

      c79b6f89770401eb025d7002fe466561b5e94eff458ebde8545f647ecb9ca888907a967edb1fa476eb5e8c7aa9de8a4b48344339297df1506fa9f0712576a1e7

    • \Users\Admin\u8kSVi.exe

      Filesize

      248KB

      MD5

      76a6dee598367ca2ce4e90457622eb62

      SHA1

      067b85364f34f26292739ea3c04706335c7a9ee4

      SHA256

      2bae3eab43e8f1761f7aa29d259d9966bc8d8f19303a53f57b7d1d4e9b11929d

      SHA512

      8125d4643b0cb63496eae85fae0907bb36c82100fd35af76dadb787b82af7d4014f071e63e2bf07021145786e11a64662693c0502cc2ba6df31a4be917c0474f

    • memory/1996-28-0x0000000003FE0000-0x0000000004A9A000-memory.dmp

      Filesize

      10.7MB

    • memory/2336-95-0x0000000002BD0000-0x0000000002C10000-memory.dmp

      Filesize

      256KB

    • memory/2336-94-0x0000000002BD0000-0x0000000002C10000-memory.dmp

      Filesize

      256KB

    • memory/2336-99-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/2336-100-0x00000000023A0000-0x0000000002406000-memory.dmp

      Filesize

      408KB

    • memory/2336-101-0x0000000003150000-0x0000000003190000-memory.dmp

      Filesize

      256KB

    • memory/2336-82-0x0000000002990000-0x0000000002991000-memory.dmp

      Filesize

      4KB

    • memory/2336-83-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/2336-93-0x0000000002BD0000-0x0000000002C10000-memory.dmp

      Filesize

      256KB

    • memory/2336-78-0x00000000020C0000-0x00000000020C1000-memory.dmp

      Filesize

      4KB

    • memory/2336-79-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/2336-80-0x0000000000400000-0x0000000000466000-memory.dmp

      Filesize

      408KB

    • memory/2336-81-0x00000000023A0000-0x0000000002406000-memory.dmp

      Filesize

      408KB

    • memory/2336-90-0x0000000002BD0000-0x0000000002C10000-memory.dmp

      Filesize

      256KB

    • memory/2336-87-0x0000000002BD0000-0x0000000002C10000-memory.dmp

      Filesize

      256KB

    • memory/2336-91-0x0000000002BD0000-0x0000000002C10000-memory.dmp

      Filesize

      256KB

    • memory/2336-84-0x0000000002BD0000-0x0000000002C10000-memory.dmp

      Filesize

      256KB

    • memory/2336-92-0x0000000003140000-0x0000000003141000-memory.dmp

      Filesize

      4KB

    • memory/2336-97-0x0000000003700000-0x0000000003701000-memory.dmp

      Filesize

      4KB

    • memory/2336-96-0x0000000003150000-0x0000000003190000-memory.dmp

      Filesize

      256KB

    • memory/2840-47-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2840-53-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2840-52-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2840-50-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2840-39-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2840-41-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2840-43-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2840-45-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB