Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 10:14

General

  • Target

    uninst.exe

  • Size

    83KB

  • MD5

    61bc2c358e49694b01cb4bbac372e137

  • SHA1

    5edea6110b3fe6fd22ef82469368c694513871d6

  • SHA256

    76b2b91979ed0a988ecf14e29a7970dfa20667c6b0ae59828009147638ad2bf5

  • SHA512

    b34a0d1c73803476aaa2a3206bcf1020a3f875031963c1560eb999e24b98363ee381b93e1914a17648b6696d8c219ff2f99ff919a4890d49fe5445ee414f1de1

  • SSDEEP

    1536:/Px/CJAmx2/W5Ebnto4tmJPYRN6QcIA4lvs1eP/w49g3XTsJLYKq:3x6UW6tpmJPqTP/wQg3XTsJsKq

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uninst.exe
    "C:\Users\Admin\AppData\Local\Temp\uninst.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Windows\SysWOW64\regsvr32.exe
        "regsvr32" /s /u "C:\Users\Admin\AppData\Local\Temp\SecPlugin.dll"
        3⤵
          PID:2816
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://spreadsheets.google.com/viewform?key=p3d_cpiUwq6REr5QYZBilKQ
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2528

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      304c27b7bb569acc2c5b49628bd39579

      SHA1

      66f7be622bc12f9cd785395057f8f7bebd2c67b6

      SHA256

      f83b99d68181e780a59b59499271741d93173de01fd3fa962acc98fa754c2a60

      SHA512

      51da44c64ba29e5814c57b4ca8f081264a9b9f695b0cf4f534033f300b16cb0763eea918b7d6715be1e9a60cce789ad0cc1f93056fb7fa5c9b835d7f52149ba5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b61a52b0fad2495bb7464c3b88db3474

      SHA1

      0ea95fcf45f4e7048fc60cbf4ab37e696f061f83

      SHA256

      e36af1dfb55df0a9892da072cdae5b97b892bbf6b7553c493e73991d68e8e64e

      SHA512

      99ac87401ae8cba19a4319ca86d667e0365754fd067dded4f4e8b4d83be8645f4dd2b32c22fb6beb031cff9ea0d813378eea70924020796f2bd8b5ec74b2c33c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      285fe245a2718928b1f3469626d9093b

      SHA1

      9c9375baff5d221a77b25bce08ee8e7f09fda356

      SHA256

      dee9be22feda30d52c2e746e13f12db00f9963c46e68c321862169c24304578f

      SHA512

      bc2116dc9696dc3d6594c0d872ba29ef9927ded61eb73e499a93ba7ecd152f1d77b383f62db618c49f25610f5033cfd724be8603dee9059e537ca0698ad51e83

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      506824b4127a4e61d41a384616b2b4d6

      SHA1

      72899039e308b4a381208364e2f1631e92363310

      SHA256

      f22463487bfcb97fd4cd22cc476ee88a5cffa7ba8e97b692f80294ca9e50df00

      SHA512

      107773bb3ba02cb5b7f6371792da5917f9002321a6d0cd6d1b09a6fa47510530adda411dba6e06fbfae6700181ba00873fc0cbdc4f49dad1d8e6b6650f2f5132

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c95875f6ef6cb57da0f84c12945739a1

      SHA1

      e0cfb505947e6f8f20ba452b6f54ba028c22d83f

      SHA256

      6d39ce8717836d0a518449e5672e786ace96bce95aad41cea18fe65a04019919

      SHA512

      8e3f076b9fc788f5581d7e9ab5f7f40604497b651f504adcd34ea445f588502663a2140a62ad6ed3fa94caf2b3f432bce3023a453000fc450d1a957ba2cb0702

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      4ca7c24a30ca380895133983f8b22d32

      SHA1

      48088eec2b05c9b893eb56889e8bf115e29f5a31

      SHA256

      e6765bbd9a0f52e6d6dbea235c595d54b107ac362e8d650504e2e39f78c00fb3

      SHA512

      b51dd5c4f8ade5f483790314c006df3162bc1f02faa8b31cb527398016bc682c609abb315125a5245266716bb7c0ec7fc8a39cbedacfa85838a66877a589429a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0f82bd772dd134a630bd077470c43ec3

      SHA1

      687a64ae5dd944dcb3834e9a5530d6ae4fe011c6

      SHA256

      c71e01673391b4121545009bc83a7447c030124e8188f6bb837d9bfff96d57da

      SHA512

      a31b82a78450556fb71d7f39fc4677215d8a7880ca50429637f71e1769b9e5720230c1a96e393e45be2391d6b50342c9fc8e064c95d70919830b788a3d889865

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      83bec55e0bae74e40dd472b3d57d3c72

      SHA1

      d151b3679e8ae7ff2e26557cabe97e3b9984267b

      SHA256

      c579bc30c6d212faeb7608b21c53d0fc38f73523c4bc5a27df914c73ce052cb8

      SHA512

      35273dc795a5750d89651e42072a66182afe4f3fe3b809413e3355b61f0c8e7b7c126434f094ee71221bf5a91e750b4d091f97bf166ab3f9c84056c8c7a30a86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0df7e1fa899e64e71a3dd8be7995497d

      SHA1

      cc260923db50f49baa058bdebf3e338d7fda72d1

      SHA256

      9bb6cbdb7e33d5611b0764aa87bea70d0465ec28a9b58fbfc43f80ede5699020

      SHA512

      c1dc123623078a2e7ae8d2b7be4bfb9fd81917eaaab0393f6b17045e91340af5c7664e2afa9e5f29d5b891ea414d1c66ffed10ba8165d0458459e6f5fea2b19d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2f2651c9bd060eaa5123cd4a5fea996f

      SHA1

      f2cf471bbab5382b52abf521e7fca792785894ec

      SHA256

      4709eebd6e6939cd649ace4b03987799d8e207665a89c8c59d153efe38f35990

      SHA512

      24708dbcec10ca85bfcddd9bf0563745bba7ee31c6c9ea057c1733e1f6192792dbd6beec311fd7986519bb311df8aba057c7e19ece12bef316ee79b71179c381

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      16506d619f9d919ed5a55486c38c4955

      SHA1

      f008c3eb4e66ddbc6e36e3788caf57fffd0b4eff

      SHA256

      788f2b3d3d3d927d67689f241021cba12a288542de73dc95f45a90d4290d532c

      SHA512

      b0c318da0194df6348b2e3769137cc39b889147ae4dac55b4f2769dfc13d6f1146dabd905235d4c3d6c25894705628416e17959094331f788aa45c6a00b2b05c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b0ac4e8e35900170141ffce47cebebe2

      SHA1

      187104f23bdd01ecc29df8f4965d1bcf8cea9206

      SHA256

      c8f77ce5859edd0b3b5bcacdc8bf6a60723a1d40bd322ade66b7848e24a1dfe9

      SHA512

      bc67f324c13b47f16bc83c0d5bcb23d0cf5b5755a315d29867429e9711da7176310e15d7e23201d57f5c77ea5a5cd56d7aa139a2f3643877aaf702cd2cbaf5e5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b6187e7be93a14b7b9f4a3bc471ea5e3

      SHA1

      9ef4135e950898db95cca570b9f687f9075bb4e0

      SHA256

      2a3708f4cd63a988aa2dc7f3eeb2b443ea3670a941e01d14653a1d8f666206d2

      SHA512

      373ae37e0d231ab1df7b0300269bbfb0148bb0952f68d678957add7c3e122a198fc083c501bd1f489664baa4450dedef121e4e95dc93ee44e8701a536a00ae38

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      70309745167e4b9ce52156d41d5114ec

      SHA1

      12350fbd98a80d38b508980684d0d8ec821abf15

      SHA256

      6aa644d31b455f0993c736f0ba40f44365baafd7386c9bf5177bde070d1e7a14

      SHA512

      5cbabe557040a2174c3205dc8b09568c60a6918040bd748137b2a1f014c75e7867ec22f719f6bd05c9cf1172c864ab16e135835f55b7242839975a15ac15c32f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ac3b6f84ef31cbbfbda8a5088ce62f61

      SHA1

      be2aca0dcf9869350ff8b651a776c430babf75c7

      SHA256

      b4e03c60270e28c5e2dd8310cd1f3fe7bd1279a44c072c0d2790a7092f8cda5c

      SHA512

      4a29871a275aa3cef7f1e584e4cb70c9683ff22a3ddff79737f5226f0f83b5b5be5cef56d2870299f403c2ddd11d1f930055b3c812c742d2be79a11dfd02fdae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      26ff60d256790e1fe6705a62efd8d580

      SHA1

      2fce7e16dddba75d3ad7bb47bccf7fff90685fdd

      SHA256

      173cc6262fc151b75fc296ed0ba0c095684c7af4093cb4fe52ca7f545516a8d8

      SHA512

      0d91d86f93e04996732e0eb6dbe27475e465ec1ecf5ee2d79e71d986ad31ac807e38d2a211bfb760ce190cf40408fc01201fab2e73c0838fce84e1c0944c1d4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      32c5858a8b3c10199939e99887104a9a

      SHA1

      abf0170b96a5a805f003b8cb007edd9109d91966

      SHA256

      c01479bead232dee704f0e56b56f50d098cff1f0ad5db015d0d14ffd4dfced2a

      SHA512

      a2ed63b09c03e0dc64ee37da23eeaad65573b77129963bc58f77bf1dcf7f4497eee6fb95ac38667a03ec3ebe689f7226efd712d7a74ce4126c763ff41b36c3a3

    • C:\Users\Admin\AppData\Local\Temp\CabB6C2.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarB6E5.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • \Users\Admin\AppData\Local\Temp\nsy5967.tmp\FindProcDLL.dll

      Filesize

      31KB

      MD5

      83cd62eab980e3d64c131799608c8371

      SHA1

      5b57a6842a154997e31fab573c5754b358f5dd1c

      SHA256

      a6122e80f1c51dc72770b4f56c7c482f7a9571143fbf83b19c4d141d0cb19294

      SHA512

      91cfbcc125600ec341f5571dcf1e4a814cf7673f82cf42f32155bd54791bbf32619f2bb14ae871d7996e9ddecdfcc5db40caa0979d6dfba3e73cfe8e69c163c9

    • \Users\Admin\AppData\Local\Temp\nsy5967.tmp\KillProcDLL.dll

      Filesize

      32KB

      MD5

      83142eac84475f4ca889c73f10d9c179

      SHA1

      dbe43c0de8ef881466bd74861b2e5b17598b5ce8

      SHA256

      ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729

      SHA512

      1c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1

    • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

      Filesize

      83KB

      MD5

      61bc2c358e49694b01cb4bbac372e137

      SHA1

      5edea6110b3fe6fd22ef82469368c694513871d6

      SHA256

      76b2b91979ed0a988ecf14e29a7970dfa20667c6b0ae59828009147638ad2bf5

      SHA512

      b34a0d1c73803476aaa2a3206bcf1020a3f875031963c1560eb999e24b98363ee381b93e1914a17648b6696d8c219ff2f99ff919a4890d49fe5445ee414f1de1