Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/01/2024, 04:17

240111-ewj4tsfcf9 7

11/01/2024, 04:09

240111-eq4laafbg6 7

10/01/2024, 02:48

240110-darq4scdbn 7

10/01/2024, 02:33

240110-c2bcrscbfl 7

10/01/2024, 02:10

240110-cls8msdaf5 1

10/01/2024, 01:31

240110-bxfw1scec5 1

Analysis

  • max time kernel
    598s
  • max time network
    600s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    11/01/2024, 04:17

General

  • Target

    mal.zip

  • Size

    4.5MB

  • MD5

    15a36183a2d2c4a43f7f203548fbcb04

  • SHA1

    3ce2a3904eeef714abec465b55a0c20f6e47b079

  • SHA256

    ebb825664642befb034e02fdac2c2ed618f2832e563f1380f8f02e738e477345

  • SHA512

    67325d485999e25cbe1c31162af5f3f081de3a22b15cd7b79470c20276a4fb299762835d94e7a4ffa4756b41df9eba7d692d84d455d7645e5e09386a09b18e4f

  • SSDEEP

    98304:pOA4lR+FGuh9N2fQdB9ySsivCYOxSeWs10MS9UVmpLhVGQvnUQqy5H+:pSR+FGugfQdB9vlvChWmdS9U2LHFZF+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\mal.zip
    1⤵
      PID:228
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4756
      • C:\Windows\System32\msiexec.exe
        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Documents\mal\DHGVD67JH-7DVCJ7HF-E7CLJHE7YH-E67FBHCH-7992643.msi"
        1⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1976
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding A5940C783D1D6785DAB21049DEB284A2
          2⤵
          • Loads dropped DLL
          • Blocklisted process makes network request
          • Suspicious use of SetWindowsHookEx
          PID:1200

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\Installer\MSI9EA7.tmp

        Filesize

        554KB

        MD5

        3b171ce087bb799aafcbbd93bab27f71

        SHA1

        7bd69efbc7797bdff5510830ca2cc817c8b86d08

        SHA256

        bb9a3c8972d89ad03c1dee3e91f03a13aca8d370185ac521b8c48040cc285ef4

        SHA512

        7700d86f6f2c6798bed1be6cd651805376d545f48f0a89c08f7032066431cb4df980688a360c44275b8d7f8010769dc236fbdaa0184125d016acdf158989ee38

      • C:\Windows\Installer\MSI9EA7.tmp

        Filesize

        536KB

        MD5

        08443f649877d8684ca72368d820b46c

        SHA1

        ebd252bd5cfb4b798853a4d072b30a0a3aa2d825

        SHA256

        36612ff8cb2387af23f9a2c15a7031ade068e6eda38a503774b4d8a534cdafb9

        SHA512

        f2ec4bb1692de0e5e30c5b9cf484d2364b4be9ccafda6ced5d6e804660b13444523dfc9d4f06146217ef024dfe2820e92112cf8bf4826c86bdfbed7d4c6461f4

      • C:\Windows\Installer\MSIBE2B.tmp

        Filesize

        501KB

        MD5

        2c91bd371254bbdee30d9b90eff1d9c0

        SHA1

        94899a8f8e80ad55fa19473eb0ffc603b04ecdf0

        SHA256

        36dc916472365331171bfcb6b0c520c831813f12c5d8fd7be29e099ca3223b69

        SHA512

        04e0682be2bd3a326d6e4ad3f2f93d010766bd02b18686fee8198e5ee8183d9566e7c8ffcbad7127958e2fad0807e57e5423dda0bf24c42974cb91c1a49e9e61

      • C:\Windows\Installer\MSIBE2B.tmp

        Filesize

        757KB

        MD5

        681ca7f522141b2c2fa8df2588153275

        SHA1

        4ed98cd37c99e5562199b85c9c41f1b2406950b5

        SHA256

        43086eb5f7bec64159bcded5d4370dd20bf29cd06c1cafd36e9eccbe302d99d6

        SHA512

        d99b01a9552e0ce755d3ce13bc619949508f220468bc169d6fa2693cdb3ddb59191e7cc7438bb00c63e817f9a3e51506a599f23345f31edb72496396cf02b1ab

      • memory/1200-26-0x0000000073E30000-0x0000000074987000-memory.dmp

        Filesize

        11.3MB