Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 00:07

General

  • Target

    4cd0aa65d375f9edb94986ff5785834d.exe

  • Size

    200KB

  • MD5

    4cd0aa65d375f9edb94986ff5785834d

  • SHA1

    8c3a4811588a9281011542decd827daf028eb4f2

  • SHA256

    955d5d2bf1cd67196b174dde14c9871b37c72b08777915836cb246b86e3e68ba

  • SHA512

    07423da446e8dd68873028336a1420567a633646142ce63e7498f60ef94f36b1303c2e8a71ac126300a51a086e58e3126a54b8c2a585a07dd6f05449ac616ace

  • SSDEEP

    6144:jD/SXeNQCJXtEpIE5nVWJVErxIgldFaobgVl:iuNtJXjE5nV2VSldFaobgVl

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cd0aa65d375f9edb94986ff5785834d.exe
    "C:\Users\Admin\AppData\Local\Temp\4cd0aa65d375f9edb94986ff5785834d.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Users\Admin\AppData\Local\Temp\jiii\4cd0aa65d375f9edb94986ff5785834d.exe
      "C:\Users\Admin\AppData\Local\Temp\jiii\4cd0aa65d375f9edb94986ff5785834d.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\jiii\nxdyalu.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall delete allowedprogram program="C:\Users\Admin\AppData\Local\Temp\jiii\4cd0aa65d375f9edb94986ff5785834d.exe" profile=All
          4⤵
          • Modifies Windows Firewall
          PID:2780
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\jiii\moswtop.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\netsh.exe
          netsh.exe firewall add allowedprogram PROGRAM="C:\Users\Admin\AppData\Local\Temp\jiii\4cd0aa65d375f9edb94986ff5785834d.exe" NAME="lvideo" MODE=ENABLE PROFILE=ALL
          4⤵
          • Modifies Windows Firewall
          PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\jiii\rrqexjvbb.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall delete allowedprogram program="C:\Users\Admin\AppData\Local\Temp\jiii\4cd0aa65d375f9edb94986ff5785834d.exe" profile=All
          4⤵
          • Modifies Windows Firewall
          PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\jiii\d.vbs

    Filesize

    304B

    MD5

    f29420d2c10ce8f8071f6ea7787e7ac2

    SHA1

    7779bc3048f7e79ea50ca6fa1e436c1ab079139e

    SHA256

    04ac562613efabc8a5c3737600840f342ff07d67edf6a9f35e54af476a9e6273

    SHA512

    cef1010dba4e13b0dc81dba96b216d5eb6b4c72b7ea131d5054d71ef4acc10f47dbb51baa2e0226e8b8be365d0424e53513700d18c13a845a9062714df3dde7e

  • C:\Users\Admin\AppData\Local\Temp\jiii\moswtop.bat

    Filesize

    225B

    MD5

    1971b1b28e1b87e0b2f6d90b1428c8a4

    SHA1

    e7e3bc867f5a0ffaacbcb189e3423d6780896945

    SHA256

    b42b4df0c8285ed8de80d6f1b51a8bb71f9cc3258cf61f010e7d83b88c8ede20

    SHA512

    711ec88b63ef1afcb03c76c0431f89222f3baedfe95dfb32bc5a88f46cb9166ac3016bfa547f8ae82c941939e97730f41a6e6ba4072cf23e0227294bf82e9445

  • C:\Users\Admin\AppData\Local\Temp\jiii\nxdyalu.bat

    Filesize

    198B

    MD5

    e8e8d5304c47d9230ab038037fcf8760

    SHA1

    92b00902b0c01b33d288e7b10cb6077aa24c3d5d

    SHA256

    c0a06cb111326bd634ce7dba187ad9db9dcc557b1b68efd48cc0288dbfb3116c

    SHA512

    6ce004dbe6ecca272f104265d9c6a3ebe8c2e44ed6faec7ff86b2059138be44e161a4c4504b3d0a2d6ab3a51975ab1f31dd2a511d0f5a91d6c69d951bb859198

  • C:\Users\Admin\AppData\Local\Temp\jiii\rrqexjvbb.bat

    Filesize

    200B

    MD5

    f878aba9bfaa7fd60646d1cea072a0fd

    SHA1

    efa6839e232f4d463ce08c355b9b2ee7938f2d9d

    SHA256

    6ca435564b53947468ffcb0714f7b995bd53fdf2461d8eece9b7eece80958abb

    SHA512

    af41b729f7762b4015827327b85814745a5ffa08496362a1afe2d112b3dc078bba5dfe37999b7f4048a2add4343e466fea033fe81104f0e596c51fa091fa6379

  • \Users\Admin\AppData\Local\Temp\jiii\4cd0aa65d375f9edb94986ff5785834d.exe

    Filesize

    200KB

    MD5

    4cd0aa65d375f9edb94986ff5785834d

    SHA1

    8c3a4811588a9281011542decd827daf028eb4f2

    SHA256

    955d5d2bf1cd67196b174dde14c9871b37c72b08777915836cb246b86e3e68ba

    SHA512

    07423da446e8dd68873028336a1420567a633646142ce63e7498f60ef94f36b1303c2e8a71ac126300a51a086e58e3126a54b8c2a585a07dd6f05449ac616ace