Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 07:07

General

  • Target

    5b793f4c236615d0e919b726ce1c95f8.exe

  • Size

    1.9MB

  • MD5

    5b793f4c236615d0e919b726ce1c95f8

  • SHA1

    4bd4620de3837f7ac2d728baf86aa03e65e98565

  • SHA256

    04ca23812fd999fed94522e3617133a4d46a64fba2fa5e62df4fdb0744f37b72

  • SHA512

    30b7c867c636c161565969889212236c247dd218851fc2958f8ace20e4d6e5bf1ec46907d255a3b8fe43a6799635906834949863e5c3cb6b3f55689a9deb330c

  • SSDEEP

    49152:6eMMxzYlq98/RkQb8CuMebT6yr3D4DasF1lasFm:6eMMxzf98V4CutbTfrz4DD1lDm

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 51 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b793f4c236615d0e919b726ce1c95f8.exe
    "C:\Users\Admin\AppData\Local\Temp\5b793f4c236615d0e919b726ce1c95f8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\RtHelp.exe
      "C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\RtHelp.exe" --InstSupp --Supp 602 --Ver 169
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2664
    • C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\RtHelp.exe
      "C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\RtHelp.exe" --PreCheck 602 --Uid 7CB6D2E41EDDD24EABFDB816EBB2FA9B --Ver 169
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Maps connected drives based on registry
      PID:2504
    • C:\Users\Admin\AppData\Local\Temp\nsz7773.tmp
      "C:\Users\Admin\AppData\Local\Temp\nsz7773.tmp" /S _?=C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Runner.exe
        "C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Runner.exe" --Uninstall
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2716
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {186B7714-87F1-44EE-A9E9-99C2B395B706} S-1-5-21-1268429524-3929314613-1992311491-1000:XBTLDBHN\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Runner.exe
      C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Runner.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Runner.exe
        "C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Runner.exe" --UpNav YgByAG8AdwBzAGUAcgAuAGkAZAAzADEAMgAuAHMAbwBmAHQALQBjAGQAbgAuAGMAbwBtAC8ATgBhAHYAUABrAGcALgBwAGgAcAA/AHAAPQAwACYAcwA9ADUA --DownNav QwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcADkAMQAwADgANwBEAEIANwAtAEUAOQBBADEALQBCADkANAAyAC0AQgBGADAAMQAtADMANwA4ADAAMwA4AEMANwBBAEYAMQBGAFwAVQBwAGQAYQB0AGUAXABFAHgAdABQAGsAZwAwAA==
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2472
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 272
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\MSVCR110.dll

    Filesize

    321KB

    MD5

    d4c35ae6a6064996ba269fd6a378c16c

    SHA1

    906a9b8d27e13f5f5a03fa67965248307254917a

    SHA256

    279c331400e4f1d60208ebce611ecabfdc8b8866ec00257f95e70340467f1048

    SHA512

    1a6c19735d90cfff0af9400d1b35936ec6c42c1a74d2b5c37f180c1d2f9c43d9d9279d29479967dd266d17c0302c19c862d9c2d4d29c165c7b0d5d8916aa9f68

  • C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Modules\7z.dll

    Filesize

    92KB

    MD5

    1cb527d5c788689c3d14c3a3e8da16d5

    SHA1

    fd4e08760de556c01a4646b9ee31ce3e6d5eeae5

    SHA256

    2deecc63dd7de22cb2857cde6059629d1748b8eade140a6617e072fe2e7f05d6

    SHA512

    37d1b7b325978a5a5e2b87b471df717730c6a0a8e73efbeef1439360aacad3598326615f90bad4d3460877de89eda005ba0c886fbbbb46cc13388e0435e20426

  • C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Modules\ManXec.dll

    Filesize

    64KB

    MD5

    63f791ce647ef2f1d9722e06ca6cdb9a

    SHA1

    96cc770b25fda2e0baae60d38c4d27e53e9e6434

    SHA256

    426ba998539a070509202bb21fd035311b85f790cf63869dd7c77fc088d56634

    SHA512

    185d3e7cc238c08fab5716dc0fa582470c4822970fb7eee3bcff036d296154dfee5a5bb4a49f06ad54e313b1a6a3ced62e8499df8eba9b12a369101884b65e86

  • C:\Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Runner.exe

    Filesize

    92KB

    MD5

    b7348b8fab718c3f993ac8be685c64cc

    SHA1

    edcbbebc64a678688b35f272173f3f83c95f4564

    SHA256

    515e3d2c91a984c9893491c1fe0468feaa1c81193cc54129e7c45c4f30e91f53

    SHA512

    84dc31c824c5d635f1875adf460fc0fb7d9683f67b3836532d63448fd6e3e6dbd0e9f0ce84be80344a8d6348de2437f92347adde97dc2d9b4b7a181c734380d6

  • C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\MSVCP110.dll

    Filesize

    522KB

    MD5

    3e29914113ec4b968ba5eb1f6d194a0a

    SHA1

    557b67e372e85eb39989cb53cffd3ef1adabb9fe

    SHA256

    c8d5572ca8d7624871188f0acabc3ae60d4c5a4f6782d952b9038de3bc28b39a

    SHA512

    75078c9eaa5a7ae39408e5db1ce7dbce5a3180d1c644bcb5e481b0810b07cb7d001d68d1b4f462cd5355e98951716f041ef570fcc866d289a68ea19b3f500c43

  • C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\MSVCR110.dll

    Filesize

    137KB

    MD5

    a7c48563dab806f7118ad23a5c0292e0

    SHA1

    8f626e1aa1ba2d92aef17d339b2afe2064e50a3e

    SHA256

    7350c23cbc859124640e5d7049543527a3f91f6dc689cd2cfad3c73bf4bf3b8c

    SHA512

    a0dc2598f5670f9fa73c1be2320b50b274672c646a265f498a8cc4516a190a39025e17e7195d387128fadeeb2c7a53ca5c53fd81f66bb0afddfe691009fb5cf7

  • C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\Modules\CmlProc.dll

    Filesize

    9KB

    MD5

    3d3012b54a28dd746f6d5d4ad4dc9fc0

    SHA1

    bd4a2723d121b0b7b4367b43b0d2e70b198d3ebe

    SHA256

    036cabb6a5dd2dddf0f3dd088c190ea21664eda917de6db5c7ba751f25ce7626

    SHA512

    c21803ae11b192024cdab9b29951f41eaa9a748606effec4b3c29f31487d4d5d0996fb49130343c95ce7af754325a0fc8d7c6cbcabc457fa91565818c4148dbe

  • C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\Modules\InSes.dll

    Filesize

    37KB

    MD5

    be7743545f785c091ffd235492f12174

    SHA1

    7052bd6c2920b744b190b081cb5ca4eca5789cba

    SHA256

    775657c265c9a1ae51049884f09eb39cccbe593949d6c889cb473cc361f15576

    SHA512

    c237ee740d5aa3f7b20b5c8df38cc529970a7649c8a7bc0d3bd59a3610c0ffea296f0b764f616e55dd50591713b1f7dc9f6667b6337fd40fec1c034a89835730

  • C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\Modules\ManXec.dll

    Filesize

    97KB

    MD5

    4a65b708f29e3169fdf27acf670b3ba1

    SHA1

    eb5284242f22710d585108a35327944a6ab49786

    SHA256

    97f9a7d0bea9a19b3a87813aa80dc5afe2c25103579b0baaf555d275845afbbc

    SHA512

    2cdd16ec4be6b0e8de58f51555bde2ebeb228ff992f56c8e0a502bb70fdadd98ab6d459bb02581050deeff36ee2d2fe22f12bb9a8c3fb91648ccca33d4e3a7cf

  • C:\Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\RtHelp.exe

    Filesize

    382KB

    MD5

    607d1a5ea36ca46e4d7d2bd08eb4bfdc

    SHA1

    00346e5f947531c005cfe60e85bd03041d78958e

    SHA256

    4ead0d0d44c0b3f381d10a2027356d307c1a3dde15c27d1c3cef2ee5f982dfe8

    SHA512

    d65450975ce0281a7f6fdde4975510837f7d487f6fc94ceed031f57407718a8e0e13a9d14e317cd86de7387cf27d34dcc58fb76572b1b16823fc983d3c2f0162

  • C:\Users\Admin\AppData\Local\Temp\nsd6874.tmp\UpdHelper.dll

    Filesize

    133KB

    MD5

    452ce0b8d77359961b7918cbb98a4dba

    SHA1

    4d14210d41ac4ee0d3644dbdb35822d6bd28c126

    SHA256

    6e5f58aac49eb4662467f301309fc1b85d588fa71ab281dc8cd57b22850ed7e4

    SHA512

    d7300aab2ef365310334ccf7781f9e1d0b38709f3f740ac4267215b1a8bfcf5889ae72a83fa986ea0542622ce348982beaa17b3ee3c10a67e8dab32cb9aa8d7c

  • \Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Modules\CmdProc.dll

    Filesize

    77KB

    MD5

    e14e6451afc15dd24ebe40e4a2ac20b4

    SHA1

    505665bfc33c035ec949646a374251e4750a9331

    SHA256

    aab10a2a93e4aab741e0b3919378503af08f54b9e8fdf29d3c0bce5585ab2bbb

    SHA512

    48bfa23bd0a299d858cabc739cc12108de2ef3c69acf4944e3b72ba4581be00c6edbb9edf3cbae8518ea59074415754928d9b863db388c29df6bda4eedd84e0f

  • \Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Modules\ManXec.dll

    Filesize

    78KB

    MD5

    0e6953f8c6197fbe4e70d3545bee458a

    SHA1

    72f2d4f7f3a91fa99d5e5a4c2876fd70d2b80efc

    SHA256

    711ad81542c84ab43658d21db2c8e489be81e10ac0daf6a01613a0d632d1179f

    SHA512

    286836b572561f0170fb5847fc7638bc34339173be1778c708c9524aaaf781a3954eecbfb06feca8e7ae1fbe877490bb30f95cfc2efd427e70b7ca38dc8ac7d7

  • \Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Modules\NavSupp.dll

    Filesize

    47KB

    MD5

    1ca77480274d6128af16a97f36fd6d7f

    SHA1

    ac4ed629cf20d61c75c47f89a74e79c116e7b8b1

    SHA256

    0469799f18dee94b7777333bef55182f4512c976036971ca15f44c32fd436408

    SHA512

    dc3fdafe57a6d121d027576e9badf5f22140a0069f5eb1c559f546ba2edef7d737f3f040cf02c7f6697be504dbdf34a2fb13fa350852740539132d46711dfff9

  • \Users\Admin\AppData\Local\91087DB7-E9A1-B942-BF01-378038C7AF1F\Modules\WblSupp.dll

    Filesize

    119KB

    MD5

    deda30850741f7c4e2be5e9dc1942e60

    SHA1

    15ef5aac2cc10e9a612b71242a5fb68f707f4e53

    SHA256

    3138311dcbee19a032c76ca0c7174d3ff37e91873f17e18d80fe6c6bd6cdff60

    SHA512

    bca086e5b03c5e9deaf4aa35cd3a1b2630d243d5bcb3001498ee077a9ed14d2e506a43f00af0025115a267b9a5fd8be6307300b68530645b9f096f291c365594

  • \Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\Modules\CmlProc.dll

    Filesize

    2KB

    MD5

    5505d72569a71496a6a07748f87d48ad

    SHA1

    af5cbaa89856242efd31852d2ff622ec6df763cc

    SHA256

    e35ae209d1898391d7b1cb0dbb1dab4a889943293ccc01bad9f987b86d13916e

    SHA512

    37ebd1138ef17785797717cabe9c23f22b3b90128f393a78072de3aa4a6bfa7be9c80271a023b82f095f699b63eaddf76de157a9aeb0fd47e064955fddf67596

  • \Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\Modules\CmlProc.dll

    Filesize

    85KB

    MD5

    382e18b922ff9db6fd868a7d30f4755a

    SHA1

    be44d626095cdf29b1e1faeca701bba2aac4f947

    SHA256

    014b807f93085b4180117702981e6e56339759704feec96992ab8695e6079ad0

    SHA512

    afe3104df8e6323d073027c50519713c13fc1ebf56277225a4dc6becd92f1087c7523b5fdd150bb5ff6fc827692afab2abbd24f60a9fff2a7299d3ac11c6931f

  • \Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\RtHelp.exe

    Filesize

    386KB

    MD5

    524804c86da18b53fcb2b30bdaa80dff

    SHA1

    f8d5c3da864a442cb327dbe6fdd6ddd630bd2830

    SHA256

    596139d6377efda71e4d9126035e5f009dfd09242b72ecd9a31103c02d82e9bf

    SHA512

    bc16d178ec6b7c2907e5d7a30318a4777f25b6cad6bc2dcb6f8226a9d825db07302447cb0ad7a0a1c63a3c04a4bb96b21abc7379c04c8593ff23f5276bafe6c5

  • \Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\msvcp110.dll

    Filesize

    512KB

    MD5

    50cfd0e38ec9759dc590012474f01d4a

    SHA1

    742566a9e07b0f867ea59dcf2c740bc5c5a2884a

    SHA256

    9b9d907f94e7aa38bc4d059dab23b63a7b5d2aadc1592c461d4d74cfe121b9a7

    SHA512

    26df5e6b99bc67a9bcb411eb5c448dba3c3a2714536dd51a241026e3e3d0da8bf3c9563204ad609bc1af030855fa3d3b97604cf8d50e9b7c3443aa35e53f0c5c

  • \Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\msvcp110.dll

    Filesize

    92KB

    MD5

    45953a03e30479becfda1d27a08d48c1

    SHA1

    d258503d40ff938f984389335872306adf7383d0

    SHA256

    1db93362753ed2d2f851a6bac5b2edf3cd19f40461e9d700811eb6640010544f

    SHA512

    e4e52197272da34ca37bb6cd96c510ff9e124de21d00959f6dc570edeb78636f7bd15a42706c239a073e64efb1f1ad961eb91cdb0a1f70e6abee6d57725ece65

  • \Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\msvcr110.dll

    Filesize

    21KB

    MD5

    783060a76056ebfc6103bdd82b80a438

    SHA1

    7474e555b204cb464cdcd7d8b98781fabb7cee93

    SHA256

    8fc8e0dc6b916c054b27349b248608b1a6fd3c9029ba331b9378425f0d2f9e4e

    SHA512

    89c304eeb8862d3c17cf757e92273ad3da04e389d2c5bf976c18b5fd8f634b4e93d53bfc7e1841a7f26e74347c33d5920c9b351e616b3900ac6b153a5383f8e3

  • \Users\Admin\AppData\Local\Temp\6A15566E-92C2-814E-9D99-0C6F4A429BC9\msvcr110.dll

    Filesize

    93KB

    MD5

    06033bd9fc8cf11d256acb22649aba8c

    SHA1

    f97528eca39e74bce810abf900d6df1f4a8c3862

    SHA256

    3c98a71e28aa572b7f7c3cb66baf7fd6ee375135d899ab99e610610b2dadc1ac

    SHA512

    b8c0098358ddc55ffb173faa11a4f01522f02b6aaf902ea5f2d6d179063dcc0ca79f098ab872b16562d16b867a87467295b0e858e1af060dc1cff0dc6bff3cac

  • \Users\Admin\AppData\Local\Temp\nsd6874.tmp\System.dll

    Filesize

    11KB

    MD5

    3e6bf00b3ac976122f982ae2aadb1c51

    SHA1

    caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

    SHA256

    4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

    SHA512

    1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

  • \Users\Admin\AppData\Local\Temp\nsd6874.tmp\md5dll.dll

    Filesize

    6KB

    MD5

    7059f133ea2316b9e7e39094a52a8c34

    SHA1

    ee9f1487c8152d8c42fecf2efb8ed1db68395802

    SHA256

    32c3d36f38e7e8a8bafd4a53663203ef24a10431bda16af9e353c7d5d108610f

    SHA512

    9115986754a74d3084dd18018e757d3b281a2c2fde48c73b71dba882e13bd9b2ded0e6e7f45dc5b019e6d53d086090ccb06e18e6efeec091f655a128510cbe51

  • \Users\Admin\AppData\Local\Temp\nsz7773.tmp

    Filesize

    184KB

    MD5

    20b2865608eb8d71228a7b3cfba09870

    SHA1

    c7752f730a5daa13b79df8692d59d3471e7cbef9

    SHA256

    d779de921afe618b2ae3c8a21128b7afe1464c563cfa4ab8d917ed4b6e7f7ce0

    SHA512

    bb7e9240acf8b931e65f37cd4b1144b6557bd8f1c6870e464b9d64a417da194766f294f56057727474ca9efacc445112be93de7ef0c44083073560fcb4f5cb6f

  • memory/2060-63-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB

  • memory/2060-64-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB

  • memory/2060-60-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB

  • memory/2060-62-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB

  • memory/2060-151-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB

  • memory/2060-152-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB

  • memory/2060-153-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB

  • memory/2060-154-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB

  • memory/2060-61-0x00000000002F0000-0x00000000002FA000-memory.dmp

    Filesize

    40KB