Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 19:59

General

  • Target

    027389c20d92aabc4084188a7896983b.exe

  • Size

    306KB

  • MD5

    027389c20d92aabc4084188a7896983b

  • SHA1

    a61aa306d4c4fdd915a9b01e0ecd5aa5cb6aa3df

  • SHA256

    23cc50e5f7806dc0153ddd81ea6e60f339c1e8f08530648bf2c891539a338e5b

  • SHA512

    a3530cc7570dc3f1d574a353e324413a7679dc3debeb9a533934decb6a845f0e9a52db64935fea15b2f405f2e910e22995d6fa74183c4662067dff0361a63318

  • SSDEEP

    6144:dZdK4d8HTqfyYbqkqrd/QO9qqXPNNyAzG9T7kVkU/5:dnKE8HDrR4O9qqfGAUT7kiU/5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\027389c20d92aabc4084188a7896983b.exe
    "C:\Users\Admin\AppData\Local\Temp\027389c20d92aabc4084188a7896983b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Modifies Internet Explorer settings
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp38035e49.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 112
        3⤵
        • Program crash
        PID:1576
    • C:\Users\Admin\AppData\Roaming\Unak\ahpila.exe
      "C:\Users\Admin\AppData\Roaming\Unak\ahpila.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3040
  • C:\Windows\system32\DllHost.exe
    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
    1⤵
      PID:968
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1380
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1348
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1284
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "-180870883311055012991216945513-410131980-55881034612811736411587488342-898865612"
            1⤵
              PID:1540

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Unak\ahpila.exe

              Filesize

              93KB

              MD5

              8bf6f1a7841cf959d3292078919a6a24

              SHA1

              f8c4cff72de6892d15345b8ae8163145338aafc3

              SHA256

              94d353b1fee8e66ec0c1bbbb3bdd62607c36f00550c82a94e63148e78c952519

              SHA512

              60481b1f0dbc5b7023b3c2554a1b73ff8980979c8e432d81e668998d243fc35150bbc39b2fd69fb1ff75ddd8cf16cc7bc887bff3e850f073ad3fd2e26f206eda

            • \Users\Admin\AppData\Roaming\Unak\ahpila.exe

              Filesize

              306KB

              MD5

              f73b6bc586ad3ed93929d930e0833cda

              SHA1

              2c98284db992ccbb758077592c8fc885527b0bdb

              SHA256

              1fc468271aa9ebaa5662170eb6aa31fa3747e74e49828765875f852da6dd4fbd

              SHA512

              c30bb225a60c7ad59e0022f3ee3f70690ae140a0e42bb0ca12c6c45494b987fb3c653117593af1087781f64b761d4f0cd7241fc9415eedb2a0a46cd1674c8c27

            • memory/968-40-0x0000000001E30000-0x0000000001E72000-memory.dmp

              Filesize

              264KB

            • memory/968-37-0x0000000001E30000-0x0000000001E72000-memory.dmp

              Filesize

              264KB

            • memory/968-38-0x0000000001E30000-0x0000000001E72000-memory.dmp

              Filesize

              264KB

            • memory/968-39-0x0000000001E30000-0x0000000001E72000-memory.dmp

              Filesize

              264KB

            • memory/1284-20-0x00000000020B0000-0x00000000020F2000-memory.dmp

              Filesize

              264KB

            • memory/1284-18-0x00000000020B0000-0x00000000020F2000-memory.dmp

              Filesize

              264KB

            • memory/1284-22-0x00000000020B0000-0x00000000020F2000-memory.dmp

              Filesize

              264KB

            • memory/1284-24-0x00000000020B0000-0x00000000020F2000-memory.dmp

              Filesize

              264KB

            • memory/1284-15-0x00000000020B0000-0x00000000020F2000-memory.dmp

              Filesize

              264KB

            • memory/1348-27-0x0000000000130000-0x0000000000172000-memory.dmp

              Filesize

              264KB

            • memory/1348-28-0x0000000000130000-0x0000000000172000-memory.dmp

              Filesize

              264KB

            • memory/1348-29-0x0000000000130000-0x0000000000172000-memory.dmp

              Filesize

              264KB

            • memory/1348-30-0x0000000000130000-0x0000000000172000-memory.dmp

              Filesize

              264KB

            • memory/1380-34-0x0000000002E80000-0x0000000002EC2000-memory.dmp

              Filesize

              264KB

            • memory/1380-32-0x0000000002E80000-0x0000000002EC2000-memory.dmp

              Filesize

              264KB

            • memory/1380-33-0x0000000002E80000-0x0000000002EC2000-memory.dmp

              Filesize

              264KB

            • memory/1380-35-0x0000000002E80000-0x0000000002EC2000-memory.dmp

              Filesize

              264KB

            • memory/1576-277-0x0000000002430000-0x0000000002472000-memory.dmp

              Filesize

              264KB

            • memory/1576-176-0x0000000002430000-0x0000000002472000-memory.dmp

              Filesize

              264KB

            • memory/1576-272-0x0000000002540000-0x0000000002541000-memory.dmp

              Filesize

              4KB

            • memory/1576-271-0x0000000077EA0000-0x0000000077EA1000-memory.dmp

              Filesize

              4KB

            • memory/2872-52-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-77-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-43-0x0000000001F10000-0x0000000001F52000-memory.dmp

              Filesize

              264KB

            • memory/2872-57-0x0000000077EA0000-0x0000000077EA1000-memory.dmp

              Filesize

              4KB

            • memory/2872-49-0x0000000001F10000-0x0000000001F52000-memory.dmp

              Filesize

              264KB

            • memory/2872-47-0x0000000001F10000-0x0000000001F52000-memory.dmp

              Filesize

              264KB

            • memory/2872-75-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-51-0x0000000001F10000-0x0000000001F52000-memory.dmp

              Filesize

              264KB

            • memory/2872-73-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-54-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-59-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-61-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-63-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-164-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2872-144-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-45-0x0000000001F10000-0x0000000001F52000-memory.dmp

              Filesize

              264KB

            • memory/2872-1-0x00000000003A0000-0x00000000003EF000-memory.dmp

              Filesize

              316KB

            • memory/2872-56-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-71-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-69-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-67-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/2872-5-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2872-4-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2872-3-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/2872-0-0x00000000002B0000-0x00000000002F2000-memory.dmp

              Filesize

              264KB

            • memory/2872-65-0x0000000000310000-0x0000000000311000-memory.dmp

              Filesize

              4KB

            • memory/3040-12-0x0000000000320000-0x0000000000362000-memory.dmp

              Filesize

              264KB

            • memory/3040-14-0x0000000000370000-0x00000000003BF000-memory.dmp

              Filesize

              316KB

            • memory/3040-275-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB

            • memory/3040-17-0x0000000000400000-0x0000000000442000-memory.dmp

              Filesize

              264KB