Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    168s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 05:08

General

  • Target

    56c8ddd07545efef53fb690b68211f4f.exe

  • Size

    82KB

  • MD5

    56c8ddd07545efef53fb690b68211f4f

  • SHA1

    deaad8c777f4f54459d15e8e2bd2a260258b1df3

  • SHA256

    c62e53f2bfcb2e17d5e80112e54f5c923120b258b5e0546073e96d096fae259b

  • SHA512

    a4dd882ccc0b747da51f0ac6d7acf8620b872e522e7c34a9fc650604ea88fab532c9beec0e0ee426b08dab1cf525d99a055b9136d6f4ae4f7fffd4f3add84693

  • SSDEEP

    1536:0h3oDFpr18upjOWOHQRTaTalf34DanAWtHDu:09AF118upKCBaTa94Dan1

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56c8ddd07545efef53fb690b68211f4f.exe
    "C:\Users\Admin\AppData\Local\Temp\56c8ddd07545efef53fb690b68211f4f.exe"
    1⤵
    • Drops file in Drivers directory
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Windows\SysWOW64\notepad.exe
      notepad.exe
      2⤵
        PID:3396
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc config ekrn start= disabled
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Windows\SysWOW64\sc.exe
          sc config ekrn start= disabled
          3⤵
          • Launches sc.exe
          PID:2424
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill.exe /im ekrn.exe /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4476
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill.exe /im ekrn.exe /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3976
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill.exe /im egui.exe /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4772
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill.exe /im egui.exe /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2448
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Windows\tete240672078t.dll testall
        2⤵
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:948
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net stop wscsvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Windows\SysWOW64\net.exe
          net stop wscsvc
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1456
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop wscsvc
            4⤵
              PID:624
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net stop SharedAccess
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1596
          • C:\Windows\SysWOW64\net.exe
            net stop SharedAccess
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4036
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop SharedAccess
              4⤵
                PID:2224
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c sc config sharedaccess start= disabled
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2052
            • C:\Windows\SysWOW64\sc.exe
              sc config sharedaccess start= disabled
              3⤵
              • Launches sc.exe
              PID:2236
          • C:\Windows\extext240687406t.exe
            C:\Windows\extext240687406t.exe
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3600
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c cacls C:\Windows\system32 /e /p everyone:f
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:640
              • C:\Windows\SysWOW64\cacls.exe
                cacls C:\Windows\system32 /e /p everyone:f
                4⤵
                  PID:1320
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4528
                • C:\Windows\SysWOW64\cacls.exe
                  cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
                  4⤵
                    PID:2516
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c afc90a.bat
                2⤵
                  PID:784

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\afc90a.bat

                Filesize

                2KB

                MD5

                0aae412c62899e795205dc32d86bfff5

                SHA1

                2c9487de933d2bd419aece04f43f5bca32835e62

                SHA256

                38924c6ffb726cf3a6dc22eede220d2e5ac404070a3f8f453f558127d79da189

                SHA512

                32e3ba22eda6e29509231eb5cee8c19d1c3e00eb485e68bff4fcb5e21ae1b407e52b88f08d371c743e21087f37f5db41cc7f953c40db226ba95853005753e224

              • C:\Windows\extext240687406t.exe

                Filesize

                12KB

                MD5

                4e009ff93e2df09682c750fbe7c2464f

                SHA1

                73acc80925f07e3346107730d785d8ae12adc6ef

                SHA256

                a885dfb99355992889b3432c9314a7d002b2d8ff6c8c79f665ee6e4057152d3d

                SHA512

                b0dcd0b09205ac25b2cdf459314768a000ac1780fc27d171f1c9a35b07d643fe39072199adad9cf0b1e70bda9f8d8ce1d50db967602c128760b72bebc8b98d09

              • C:\Windows\tete240672078t.dll

                Filesize

                40KB

                MD5

                956b20403cc1ae613ca8f8a6099bc4e2

                SHA1

                9cf339ea6d13c5e2b3e03a76f5261b7f46854c38

                SHA256

                dff795851e9a94b78befa2e9908eb680901d0af1191bf6db159a5d7be79a18a9

                SHA512

                6aeefefd3c3887463d06448cb52d8d2c10e52fa469d92f2115605f048f981b26c513360068bd8c3e438eedbaf061923f4625c8ee016fa46b7a384d5072643fcc

              • F:\recycle.{645FF040-5081-101B-9F08-00AA002F954E}\rav32.exe

                Filesize

                82KB

                MD5

                56c8ddd07545efef53fb690b68211f4f

                SHA1

                deaad8c777f4f54459d15e8e2bd2a260258b1df3

                SHA256

                c62e53f2bfcb2e17d5e80112e54f5c923120b258b5e0546073e96d096fae259b

                SHA512

                a4dd882ccc0b747da51f0ac6d7acf8620b872e522e7c34a9fc650604ea88fab532c9beec0e0ee426b08dab1cf525d99a055b9136d6f4ae4f7fffd4f3add84693

              • memory/920-0-0x0000000000400000-0x0000000000416000-memory.dmp

                Filesize

                88KB

              • memory/920-1-0x0000000000400000-0x0000000000416000-memory.dmp

                Filesize

                88KB

              • memory/920-33-0x0000000000400000-0x0000000000416000-memory.dmp

                Filesize

                88KB