Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 13:39

General

  • Target

    72ea3b45b5d105a71168fc7afe30408d.exe

  • Size

    113KB

  • MD5

    72ea3b45b5d105a71168fc7afe30408d

  • SHA1

    a55950992079f23bc9aee95edb09d3b70c417e22

  • SHA256

    98c9acf837fbbc68d049e242f18cb975269c4fbb4b5c9772a2d76dd3f54b65fa

  • SHA512

    b3c51ec3dcacb78d9cded98cbcdb1292756710d95e5a56630bb09b765540363fb859f2b777fd1c1adfb38508a86ec55c8b81d361f95caf81354e296459781fa7

  • SSDEEP

    3072:YgSmjEAN+OkX6A88q8WtC8ete3O8EcZTlyfzGvL9Vv:YgSax+z6ADo79OFJ7GvB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72ea3b45b5d105a71168fc7afe30408d.exe
    "C:\Users\Admin\AppData\Local\Temp\72ea3b45b5d105a71168fc7afe30408d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1r.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1r.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t2k.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t2k.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2968
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\aa.bat" "
      1⤵
        PID:1728

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\t2k.exe

        Filesize

        48KB

        MD5

        374b6c5f7b3cf5871e3e3a88472fb08b

        SHA1

        ba90b89ae87ccac33e4723c7a449e8eb2f6250df

        SHA256

        8133be18e810d9e51d44bb80068aff437dfadc0c2689d6900a770fd1c1b17a82

        SHA512

        7aade8b644c4f1ea4016417006d041f5827d284a82b8289d22fef148b7105198b32b54f923eaa15d42d8bba851a1ce1ae2510b4f72d088df5a5f50270e0d0aa1

      • memory/1268-36-0x0000000002980000-0x0000000002988000-memory.dmp

        Filesize

        32KB

      • memory/2564-32-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2564-37-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2904-0-0x0000000001000000-0x000000000104C000-memory.dmp

        Filesize

        304KB

      • memory/2904-33-0x0000000000180000-0x0000000000193000-memory.dmp

        Filesize

        76KB

      • memory/2904-28-0x0000000000180000-0x0000000000193000-memory.dmp

        Filesize

        76KB

      • memory/2904-38-0x0000000001000000-0x000000000104C000-memory.dmp

        Filesize

        304KB

      • memory/2968-21-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB