Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2024, 02:37

General

  • Target

    4f5b142774646ee49a0e64379cb5cf55.exe

  • Size

    108KB

  • MD5

    4f5b142774646ee49a0e64379cb5cf55

  • SHA1

    e3cbe137d5d9d0055aab6e27a0013a1d90df2d2e

  • SHA256

    95ff1da7b20a1c764bc69e6eb03957c06e909d25cb470db3b445cdf010f454d8

  • SHA512

    507598e3cef8e30f9885a6968cc5ec6f5c87fa5dbd533cca841a9774fc4f231b8828a90baa8139bf73c55982c4d664a1abeac85408e53e5efeb6c27d7ce39932

  • SSDEEP

    1536:fbJm3OA3Bdy2pMYPfodlK5Hc3rRy9sK47gBo2aKs:EOARvfGA47gB

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 5 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 10 IoCs
  • Disables cmd.exe use via registry modification 5 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 20 IoCs
  • Drops file in System32 directory 17 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f5b142774646ee49a0e64379cb5cf55.exe
    "C:\Users\Admin\AppData\Local\Temp\4f5b142774646ee49a0e64379cb5cf55.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Modifies registry class
      PID:2244
    • C:\Users\Admin\AppData\Local\smss.exe
      C:\Users\Admin\AppData\Local\smss.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Users\Admin\AppData\Local\winlogon.exe
        C:\Users\Admin\AppData\Local\winlogon.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2696
      • C:\Windows\SysWOW64\at.exe
        at /delete /y
        3⤵
          PID:2464
        • C:\Windows\SysWOW64\at.exe
          at 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\6084-NendangBro.com"
          3⤵
            PID:2436
          • C:\Windows\SysWOW64\at.exe
            at 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\6084-NendangBro.com"
            3⤵
              PID:3140
            • C:\Users\Admin\AppData\Local\services.exe
              C:\Users\Admin\AppData\Local\services.exe
              3⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • Disables RegEdit via registry modification
              • Disables cmd.exe use via registry modification
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:4508
            • C:\Users\Admin\AppData\Local\lsass.exe
              C:\Users\Admin\AppData\Local\lsass.exe
              3⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • Disables RegEdit via registry modification
              • Disables cmd.exe use via registry modification
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:4064

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\sistem.sys

          Filesize

          10B

          MD5

          18d66f5bb829b46ba31fec38dc8edc02

          SHA1

          6331b61b52b9e3652ac4d397507cd5dfd91fb272

          SHA256

          718570acc49ac85ce98832363678da3722b2161a73bbac7610d85e2cedb1dffc

          SHA512

          544cc0010a3323f3c3248fb248c93486d0cd396ee574eb16af98a4e47024b1c975147c6ff1c905a5f85287134163ab1ac0ffd03dc8ab1d90d91da3c241a47c87

        • C:\Windows\sembako-cfzjkih.exe

          Filesize

          108KB

          MD5

          4f5b142774646ee49a0e64379cb5cf55

          SHA1

          e3cbe137d5d9d0055aab6e27a0013a1d90df2d2e

          SHA256

          95ff1da7b20a1c764bc69e6eb03957c06e909d25cb470db3b445cdf010f454d8

          SHA512

          507598e3cef8e30f9885a6968cc5ec6f5c87fa5dbd533cca841a9774fc4f231b8828a90baa8139bf73c55982c4d664a1abeac85408e53e5efeb6c27d7ce39932

        • memory/2696-201-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2856-0-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2856-200-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2900-199-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4064-203-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4508-130-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/4508-202-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB