Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 09:00

General

  • Target

    434868e3e9110f4b1dd8612189482131.exe

  • Size

    97KB

  • MD5

    434868e3e9110f4b1dd8612189482131

  • SHA1

    f2caed1c8f9b009c7d33c56b0e16ada2a1d50854

  • SHA256

    90ae15f8416ef6d07adff15ed8cb0655eb3efeb345e8099b6848c4acebcbfcee

  • SHA512

    be60746cc82d7f4169b9b80827b554d5a4a9b6ade886950d09885a494014e261e706857da159d620a878d84c504427bf480fbf93c7a28c9940785fe0cebd9bff

  • SSDEEP

    3072:+7m32cZ8UtE2UvMzSKMLTQ7ja8qULZsJg/:+K3fo5yo3Q7ja8qe

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\434868e3e9110f4b1dd8612189482131.exe
    "C:\Users\Admin\AppData\Local\Temp\434868e3e9110f4b1dd8612189482131.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c \DelUS.bat
      2⤵
      • Deletes itself
      PID:2588
    • C:\Program Files (x86)\PostTip\PostTip.exe
      "C:\Program Files (x86)\PostTip\PostTip.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2948
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Program Files (x86)\PostTip\PostTip.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2904
  • C:\Windows\SysWOW64\regsvr32.exe
    regsvr32 /s "C:\Program Files (x86)\PostTip\PostTip.dll"
    1⤵
      PID:2564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\DelUS.bat

      Filesize

      243B

      MD5

      658e675316e831edd1860e1d1c0ee2e9

      SHA1

      4bcafa8b2300a39e127e231257a207cc224c2d53

      SHA256

      6396aa960a07c812e6399f7e5fb97993940ff2d3d542e9d4db2002c6dc6b727f

      SHA512

      72b92c85e6fc6211dfb26e2f922c22ea1004f22224dd87504c6b8e1b48a06bf14f53d3282d8aa92bcf447b8bd3727346f0b1d7fe7ee616b39f949de8a373d5f8

    • C:\Program Files (x86)\PostTip\PostTip.dll

      Filesize

      20KB

      MD5

      f5253fa1969187f737544503a8f997f7

      SHA1

      fbb910f6dc8eff7d53dd0323870750df1f06ad7c

      SHA256

      3bba79e2e78129f372364d3ba37309c4d48a286c52f26b17b5ec9bdd40cabcad

      SHA512

      d6b4f17e8d155a247fe4d53a9b1664efbf989d577e4896b0a0dd4f9054fe97764b47e1420e3fb050cb08d6f74137c449411a8fb45849b7b70d7d777b34bd4f0f

    • C:\Program Files (x86)\PostTip\PostTip.exe

      Filesize

      33KB

      MD5

      a8c3d5898b69246333d8cfa021bbe399

      SHA1

      6f5b171a93cc1c2e5a201751cd8ac9c43dbe9a88

      SHA256

      8802cbbc4785fcd9e6ad0f163804f8cf49f9129a893c6bca15fec2d446ff5c04

      SHA512

      392cd8cddbf7d540b235eb1b10e790106d1bbf7c14a84419ceb1bbebed1d96131313fe59881f010ad58bd121d1700bb59578b8fea81dde4c81ec3980cadeeb86

    • C:\Program Files (x86)\PostTip\PostTip.exe

      Filesize

      9KB

      MD5

      3e450dcebb7acd69dff73dfe3aa8899e

      SHA1

      28f1fd6667b4beaac56fb2b7583db7b6614cc9ec

      SHA256

      378774c4a122238011c7f46692ea008a338d16ac2caadbe3275e9405d777e18b

      SHA512

      6610e1f630368977bd3427d6202b162689d87fe3ac83bb1dc537ac4a8a7acd21ae447d4cfbe2d6507b762ae345d170b85669ce450d5c7f7aa8e65655345da60a

    • \Program Files (x86)\PostTip\PostTip.dll

      Filesize

      45KB

      MD5

      f32f15773ac237431735793cf54a589b

      SHA1

      32c101c92e28103c370ddb89f35d7b8509f83bae

      SHA256

      a99a2f6074dfa9e55a95ea894081d3ecc32ac19ee572c3ad554a083282e204a2

      SHA512

      1e522f73922a79ef9af0bb8d8d066ca322b64f60ec97001bace5cc822dd88b0e09c4111fec63f27c2340de4f167dd5adeae5eab0d832a2bd1fafab19f42d55a9

    • \Program Files (x86)\PostTip\PostTip.dll

      Filesize

      65KB

      MD5

      8437914f9da1dc20b6439d9d901ff14b

      SHA1

      7b931496603c585ee76e4c5715d7507bb82e5f83

      SHA256

      12422e49396b3352538bae8982ada75f9d81a253292f6f9189d7a79b9ac208be

      SHA512

      994216e74809b50f0f0e29c31aedc4f083a5d1c564c10c8e19d97331b8c925430e3e1906e1f2ef61933926f0bf39ef9b7c8686735b5880fcd6d4d04734cb9b3a

    • \Program Files (x86)\PostTip\PostTip.exe

      Filesize

      38KB

      MD5

      c2b5be376cac31c0b01603105ae4ea89

      SHA1

      4fcfa0181ca5478103c6999199957be40f4a937b

      SHA256

      8ec9ca043b655d4bf868ccd7d9d5fdd4e23ad8610aed2fb983370437b7851feb

      SHA512

      d17e798a414a6d2295f13339a10151f2a34cff5a7d6c81862c26a0c4ac831bf9f867f9f2bf028fa15f189a93f8d8883a334a9857a33bcabac916376267c9da72

    • memory/2968-2-0x00000000003A0000-0x00000000003E8000-memory.dmp

      Filesize

      288KB

    • memory/2968-27-0x00000000003A0000-0x00000000003A2000-memory.dmp

      Filesize

      8KB

    • memory/2968-26-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/2968-1-0x00000000003A0000-0x00000000003E8000-memory.dmp

      Filesize

      288KB

    • memory/2968-0-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB