Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/01/2024, 18:10

General

  • Target

    543869df7a3f62112ddddf604e9c6788.exe

  • Size

    637KB

  • MD5

    543869df7a3f62112ddddf604e9c6788

  • SHA1

    51c00654efcc8b26a5a6903a175268da8aab6855

  • SHA256

    242ea0d4c0f3401cbd2cba619cb9791c39bcb3d556e1f9d1cdaa01c9b83b8eb4

  • SHA512

    9818e8583e79402c15e63618230f138e2e14d2235d7c7e4d456658461f35a1b5d315a3d19ed536e027651c16b0c4f6c3f4f9878549b2cd48977d5d087d9ab89b

  • SSDEEP

    12288:AnYS8K/8hIeI8Pzqn8/9dYd2svmt1FknuFiQOFYLcc6UplYfc8vy4ht+:AnL808+AG6t1F2HYLzd86G+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\543869df7a3f62112ddddf604e9c6788.exe
    "C:\Users\Admin\AppData\Local\Temp\543869df7a3f62112ddddf604e9c6788.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Users\Admin\AppData\Local\Temp\bedgbfbheb.exe
      C:\Users\Admin\AppData\Local\Temp\bedgbfbheb.exe 5\5\3\4\2\0\0\8\5\0\0 KktGQDs3MygtIC9OUD9MR0Q9KBsvTkBPVEtQS0k8ODAgKj9GT1JJRDUsMTcsLh0rQUlENSsgL0tNTEBTQ1RXREQ9LDE2MB4vUz1NVkVNWlJOSj1obG9wOioqcG50LkQ9TkstT0pNKT9QUCZETkZKGyw/SklDQ0REPUFib0FEZlZdQVhVcm9EW01aaC5aajZFMmwuaUZyOys5bUJUb2RKSUZRY1NQc2JJUW05TVFBZnBHSUlqVEMyWj4tbD1VRzJyVzZFY3kzbC9UR0BDS1JOWDNyY1RVVE4zb3JaQVplSV8uZVVjLDZpQWNoPXZHWi5PWjhTZmQyby00KWlYVzxLMkJDX29gXzUxYkBKKXFoX0s8RUZ0a0xnP01Qcml2azRUc19vQm5LZmh5azJnXy5pcEBIcExMVTUzNG1rKzF1dkFUSl40Smk6Y0lSSEJwXzJEM1dNbS0xU2pSSWdBUGBMd3NFdE40WmluSFZmZkA2Yx4vRCk4NjQtKx0rQjI9JSwgLz8uOikvIC88Lz0tLBssQDM9LSkbL1BNSkFRQVRfSE1JVjw+VjkeL1BKSkRVPk9cQVNMQTUbL1BNSkFRQVRfRjxNRTgbLEFWRV9NTUw9GypCVENfQ0U/TElJQDocLUhPS09fQk1KVE9DUj0oGy9UQzxLR1dPVVdQUkw4GyxSSz0yGCpEUyw4HStQVU5MRE1FWlJCSEFPTT1ETUFCQFJOSj0gJ0RTX01QS1BHTUU1b3J1YBssTkNUVUpJSU5CWlJPQ1JfPDxZUzgtHStGSUQ9Uz0xGypGT11EWUY8TUk+WkJKQVJZSE9FRDhhXmhxZSAnP09XSUdMPUJfSUg4MTAyKS4zNi4xMTAuMS4xHStOQVI5R0xFR1pGSlFUQURHPWZcZ3BhHi9UQUhFPSwvMDIvNTgxLjIgKj9MU0xMTzk/X1RESEI5NS82Jy0wMTAlMjYuMjopLSpBSA==
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704996610.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1528
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704996610.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3188
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704996610.txt bios get version
        3⤵
          PID:1392
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704996610.txt bios get version
          3⤵
            PID:3040
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81704996610.txt bios get version
            3⤵
              PID:2288
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 972
              3⤵
              • Program crash
              PID:3656
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2872 -ip 2872
          1⤵
            PID:2244

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81704996610.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81704996610.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81704996610.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\bedgbfbheb.exe

            Filesize

            254KB

            MD5

            5eebe17ea892eb4264e0302b7409a08b

            SHA1

            05999395005f5b792968c40aaed0cc353ff4b391

            SHA256

            4e6329195902ba3ea3af71b655270d1e5c9ffff7b08c27566b9d250dfaac8df1

            SHA512

            07d66263bdeb4f1d622ac1dda6e30f91e9798b42cc49951db165100d5949143937549878a9e5e5f6852c97c3ac756ed9d00ea8d5e24a03c72cd70fed4b0d0279

          • C:\Users\Admin\AppData\Local\Temp\bedgbfbheb.exe

            Filesize

            771KB

            MD5

            4ebd7055b043c197b804dea7b0471b3e

            SHA1

            c89a909e02e9045cc1b5bdf3f6555259b7dc42d6

            SHA256

            ec7f387bb9054bb6f89d7f6d101a2124cf1c43875b217024be0789d25d8daa50

            SHA512

            fd19e6656603be265b50999cec7171455510d95c58167b68d35ed51baed77845d8c4b2c0c9649726c2cd5913c00a012bbb0a4b43de83f163f5476d8f9d8b3264

          • C:\Users\Admin\AppData\Local\Temp\nsu468F.tmp\ZipDLL.dll

            Filesize

            163KB

            MD5

            2dc35ddcabcb2b24919b9afae4ec3091

            SHA1

            9eeed33c3abc656353a7ebd1c66af38cccadd939

            SHA256

            6bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1

            SHA512

            0ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901

          • C:\Users\Admin\AppData\Local\Temp\nsu468F.tmp\dfstmip.dll

            Filesize

            161KB

            MD5

            5f5bca16e33f49e1db2733f1c52c030c

            SHA1

            46fb70ff5a65319aa5d1a0aa5fd2aeadcf979541

            SHA256

            64f00ed0cac06df5d9ef74b16b157b85e7195488c7f1a24bf042b9f129db3212

            SHA512

            fde419a7a7977f4e30eeaa26775644d5142d05939369c70e20c78603697f58b765bcc82bf9cd16e4a6363a063f9c8307e06f3cf2389209d6fb23a525ba4d3c77