Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 23:27

General

  • Target

    4770b1b34dd46ebbf01d2aae352cd199.exe

  • Size

    11KB

  • MD5

    4770b1b34dd46ebbf01d2aae352cd199

  • SHA1

    ad4d4e37a5c071c3f0ca064bae415a5f1e7f53bb

  • SHA256

    90321be8cee235e44256be0128519bca1eaebf5b52880a1c0d9b3d087795c489

  • SHA512

    7ff45339d8d1f1a91e8388d27c94672d9989b20eb65c147d6e0d0ca64cccc5f66295ba4e2dab4cff46e8665c71208f304b7a2d3579714cd22346f9004dff4b30

  • SSDEEP

    192:Iuh4jDHPGc0eFNzdXYmpE3pTmTIWU8HWqOANOXMde61EattPmXFNYf+553N5kVmm:mjDOc0eb6m8ZmT3U4Wq9O9+EUtPSFNYn

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4770b1b34dd46ebbf01d2aae352cd199.exe
    "C:\Users\Admin\AppData\Local\Temp\4770b1b34dd46ebbf01d2aae352cd199.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\EF32.tmp.bat
      2⤵
        PID:4964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\EF32.tmp.bat

      Filesize

      179B

      MD5

      cc18dd1180d972b944d9adb3627fcab8

      SHA1

      8c75b492b1e3b9ccf3d60d9abdd90bc8136e4009

      SHA256

      7f5b3f0020be23a8b657d8649688fb70fc24b90497074cf6c100a7296b97303e

      SHA512

      1569074aabf4dd6d39487ca142baba9dbeaf04ec4a40d161ebcb806137fa9dd003543568fa9461fac4c5ea1f2808d41c6ba6dfbcf0562657e69b8edf19a5107f

    • C:\Windows\SysWOW64\kbdswjr.dll

      Filesize

      370KB

      MD5

      9e92f8a6ebbee1ed68f58cd9a7c48cf6

      SHA1

      1885dcd1899ba640719ac24c37b332cddfd382f2

      SHA256

      d165199c2e1da9dbb08abf76119cb7f18092c6778686f9ef4477fd97f3c693d5

      SHA512

      c4244c1478f462d59598b6fc278a78dd35f451cffb39b159dcbafd14f53c9c04b0169cea0c5f290961a5f9ecd7f7f80629686f237d734c19abd956590ad26d79

    • C:\Windows\SysWOW64\kbdswjr.tmp

      Filesize

      461KB

      MD5

      911895399d0abeb869242783e5de09f9

      SHA1

      63f73fea40e8e656b7c99bb4514eddc69a8e5fd0

      SHA256

      38325dc64e58b8b81427a5920ecc648b951148e19ee0f723f1987580205cfe6a

      SHA512

      1182d5e1cf79d541dc6d9d2d3ac541f61cf402d3eca585df38260451759f6237b034b9bac3f9c533f0fa010f8b33294cec5a72938608cbc65491f4df1e197377

    • memory/2464-13-0x0000000020000000-0x0000000020008000-memory.dmp

      Filesize

      32KB

    • memory/2464-17-0x0000000020000000-0x0000000020008000-memory.dmp

      Filesize

      32KB