Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 22:53

General

  • Target

    1f1062b09aeb776b65fb5c77e11f267e.exe

  • Size

    287KB

  • MD5

    1f1062b09aeb776b65fb5c77e11f267e

  • SHA1

    2c3c0136456bbe96921ce89f09c9a76f3e8d44ab

  • SHA256

    ec084fde2bc14fbfee8cc2a1b6f9c21b7aa5ab69f1172cdee6206aaa7e8f795c

  • SHA512

    7d860b3423e10ce0949bdd41cb1fd0fd873f16b5edf8b49d1ec607e66555e0c3d1a8503611280dc3d4c49d761997e5d9d74d97685e40bbde01d2cfbb45bc267f

  • SSDEEP

    6144:0/2MRXFyS71OZz+2e92RM0gOALzsbRHkUuruxFstiVclw8bIELXR2neoS:uFFyS71OZz+nTOALobRHkUxFskVcq8tp

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f1062b09aeb776b65fb5c77e11f267e.exe
    "C:\Users\Admin\AppData\Local\Temp\1f1062b09aeb776b65fb5c77e11f267e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\AddIns\RemoteServer.dll" InstallService
      2⤵
      • Sets DLL path for service in the registry
      • Deletes itself
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      PID:2368
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Tempfl.txt

    Filesize

    72B

    MD5

    c43f4e928de0823dbd31b1ca5466eb84

    SHA1

    8c7d06549357d3cfda433e85f436737e27177d46

    SHA256

    c412be6dedad714ca127a0c78caa767c50f6c6f9dc547b3246467e17f0376283

    SHA512

    e4df97d339672adef38d5d6494a5f8220f92a62beca2af57e78a7c4321c0a3a3df48be78a5b11c73c182bac9c309079d2c30ab0e5050c85cefe89a09238f52a9

  • C:\Users\Admin\AppData\Roaming\Microsoft\AddIns\RemoteServer.dll

    Filesize

    195KB

    MD5

    805031d61469c8e7932d653d52676cad

    SHA1

    3dcbc4d2f6e51edb49569d37a3cdfeef7bf52b8e

    SHA256

    905866b53f7f611bd13dbdffbc01cd83a86c7139f9b84bbb68fcbc60c7744d0a

    SHA512

    6b97032005d4b8796b7e4710ed396fc7f7e5ceb351e9816b18de72a2f194409638acea510c1a629e8dc6b91be28708c411887bf97e239dc21cfb77dde774c13e

  • C:\Windows\SysWOW64\3B275A5A.fn

    Filesize

    68B

    MD5

    c24dcd412d8e53eca72caeb77dd809a5

    SHA1

    3456cb00877262dd6eb91fd536644b535f9efb62

    SHA256

    f5b4648e87d532a19d0cf7e8a994f108da28e15cd4eb4cac5f355911586fa5cf

    SHA512

    f56e76ad92e0d4caeabf800d8d7d91918fb3704b7504700db08533570b3641a03000dd549aa69384d77d06270601557e318d0b4c1bf998622f4cfa0624b957b8

  • \Users\Admin\AppData\Roaming\Microsoft\AddIns\RemoteServer.dll

    Filesize

    16KB

    MD5

    ec7e485f8188c46c54b8878aeb4c4fdd

    SHA1

    a1860092e94b92bbd9bd6953837a38ffec1f8210

    SHA256

    aa522eefa84054abafb9f6373811483ce7bfe457e845d876f2a4365022868eb5

    SHA512

    c1d7ddc4de8b395d52f1beb2f45a41eb49d2937c55742782d5b860634dfaa53c11bfc3ab5152d401533afc7c5780de5c9df9559a83bca8440fe8c2c934ce8ae2

  • \Users\Admin\AppData\Roaming\Microsoft\AddIns\RemoteServer.dll

    Filesize

    154KB

    MD5

    5e5070ebc65c1b10b02000c43a58ff0a

    SHA1

    88e05899a7c8104bc2cd8efcf618255dc740b3d7

    SHA256

    6acbd1121da5cebb5f58eeb36931919c122e884de89181113dd1010dc45acdba

    SHA512

    b5c10050f443b156f9d6872d0acbc0a33d442953a75e4430dac1b56b67788cfeea49754ba230e91cb4572de90600e64c4233e3a1ab2de4c7a75625996f1abf8d

  • memory/1716-2-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/2368-9-0x0000000000270000-0x0000000000305000-memory.dmp

    Filesize

    596KB

  • memory/2368-10-0x0000000000270000-0x0000000000305000-memory.dmp

    Filesize

    596KB

  • memory/2368-18-0x0000000000270000-0x0000000000305000-memory.dmp

    Filesize

    596KB

  • memory/2368-20-0x0000000000270000-0x0000000000305000-memory.dmp

    Filesize

    596KB

  • memory/2368-23-0x0000000000270000-0x0000000000305000-memory.dmp

    Filesize

    596KB

  • memory/2368-8-0x0000000000270000-0x0000000000305000-memory.dmp

    Filesize

    596KB

  • memory/2368-26-0x0000000000270000-0x0000000000305000-memory.dmp

    Filesize

    596KB

  • memory/2896-13-0x0000000000850000-0x00000000008E5000-memory.dmp

    Filesize

    596KB

  • memory/2896-19-0x0000000000850000-0x00000000008E5000-memory.dmp

    Filesize

    596KB