Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 08:09

General

  • Target

    130be10e503004cb652d838cb28d985e.exe

  • Size

    441KB

  • MD5

    130be10e503004cb652d838cb28d985e

  • SHA1

    97735414841cce2b6e01dcbec55866cf393b9858

  • SHA256

    cfeae44425361dc32d4293313d7d380f3a07ef174fe0ceb0e0006f7181c87f72

  • SHA512

    c0754d3f44f824c048c649cfd30df2a2bbe5609be9014f42106927c9798857643d202a1f61d9ecf23604581dc62f517107cf3ca4397cabd448fc22efe1c33367

  • SSDEEP

    12288:3+i4OPDSTX0dZ+XPhFaioyyRhX9y/i5GDQrf:upbQprBff

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe
    "C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\TMP.exe
      C:\Windows\TMP.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2692
    • C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe
      C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1808
  • C:\Users\Admin\AppData\Local\Temp\is-0BAA9.tmp\is-1OI55.tmp
    "C:\Users\Admin\AppData\Local\Temp\is-0BAA9.tmp\is-1OI55.tmp" /SL4 $A0118 "C:\Windows\TMP.exe" 53192 52224
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.eset.com/download/index.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2552
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 36
    1⤵
    • Program crash
    PID:2660
  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    130ff6efe58b9ee240a8d994cab9d736

    SHA1

    ed71c496e2f7337882bca8c3b649cdc87d0aaedc

    SHA256

    bc5843cba22e2ab0244de0a1c44301132d77fc9eb6c9f271e9128e50f0dcf656

    SHA512

    e503dbe711c500eee863f33d90a2260ac261331a2216396fd7b07bdedfa2b2c1ddd6443b5139456034a37c9072c46f6301b49d4fcd9005b212e32da0a861faf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7640abedbcef73e28ba26fff255d50f4

    SHA1

    11e7b17846325131f75c788fb82f1d511233a3c5

    SHA256

    5a6f3c278dc8142af1892b6569455cd8ca6a8f5fe75b331da67c5fb9542e01ab

    SHA512

    66ed3774ed300d5c9ee0e0068b50a4cc94b8c4e5917cbac433c858bd7b22c4365094f831ec8a6031caca24dd8ff8b20e55047ab1825ab8f6244e16276a7e8ffe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5efe659005f544a49860599e38ba42fe

    SHA1

    5e475a7efd06028e9804271ed8d32a85b3224756

    SHA256

    04f3f6594be561e4c18221b7d2fb276d689a9392de21d4dc84a0828a75e207fd

    SHA512

    58856658c2b03f3f624d1e9b5dfecd3fa87a306146d94eb80f2ae0681e6576abf23692cff8a2d0c5d3a513f2bc02441c9d6aacaa4ea3ddb3e58c3eae207312a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    613f893a46b43eaa3c76645c1ace5292

    SHA1

    4241dfb58afbd9a3ed85bb3f51bb20b9564b2728

    SHA256

    b43e3623264b6845fbb57fd2159a17fc4498d852a55334165ff36d6594d41221

    SHA512

    280a25805766f95003743f726d9359af0ef332d8c7798fdaf747b582ea9fcc40a287e285a24eb3c278dffdf411d4d4d274b363b9f02716a8043687e17b021be5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1bed8deaf9646a1493c09433fa18ed66

    SHA1

    4b76e6af195890d8a5dfc73b60ecea9bcb7350aa

    SHA256

    f3f45b4b3846dbb6590d6a2ce9ecd092957901804d121d9738aef9cba43c0ad9

    SHA512

    d340d0e847724984f6f6038db57a074deac0ab29a0cce6f68b2e60aaeadcd2fb823c19b275f756e6e44f83a27927fd404f105ae6ee2d6c3071375cdca45acebb

  • C:\Users\Admin\AppData\Local\Temp\Cab5D3F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5D51.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Windows\TMP.exe

    Filesize

    93KB

    MD5

    ec6099f55e3a703b32194f501f0281a1

    SHA1

    3076854190b5376a1a90ca8ff25d53f03f4d0cff

    SHA256

    66407e6a06eb6c49900204f9a96b2128451496ce567bfb8a98c76636b4d44fa7

    SHA512

    1b2c5b146a084ecabc95b9125e807cb9dc67a56060b04ee8735d061aa95a6c7fe3d36c9c31ced0d63130eaed9a6521b846d0bb200794989499fe500a115d7aa1

  • \Users\Admin\AppData\Local\Temp\is-UJI9S.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1808-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1808-4-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1808-17-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1808-12-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1808-37-0x0000000000400000-0x0000000000403400-memory.dmp

    Filesize

    13KB

  • memory/1808-13-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1808-8-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1808-2-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/1808-6-0x0000000000400000-0x0000000000404000-memory.dmp

    Filesize

    16KB

  • memory/2692-43-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2692-38-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2692-23-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2708-42-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/2708-39-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB