Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 04:38

General

  • Target

    5582cf496275d80528eaa5c3f4783309.exe

  • Size

    55KB

  • MD5

    5582cf496275d80528eaa5c3f4783309

  • SHA1

    16b795c15c789505d94f53960293e964ad58d2c0

  • SHA256

    292f859b49b9578e855e75ad12ec42c643687f2f233344a83a55263aacc4cf64

  • SHA512

    7a90c2a3061e28f31d67ae8f196699fd93ba694d51e60b75fcd2c37582da8e7023e6274541a37f27a7d94f6c4b5a4424ee4cf28b07acc1cd219617d4c200dc70

  • SSDEEP

    1536:cpgpHzb9dZVX9fHMvG0D3XJE4Romu/Fyd+7qdqa:qgXdZt9P6D3XJE45v+mdqa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5582cf496275d80528eaa5c3f4783309.exe
    "C:\Users\Admin\AppData\Local\Temp\5582cf496275d80528eaa5c3f4783309.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c \DelUS.bat
      2⤵
        PID:1384
      • C:\Users\Admin\AppData\Roaming\launchers.exe
        C:\Users\Admin\AppData\Roaming\launchers.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1576
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4496
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4104

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\DelUS.bat

        Filesize

        200B

        MD5

        324fbd9b9bd508a00122c3d096574704

        SHA1

        ecb35204de1ac83e14df5681cad663258050ba8e

        SHA256

        2dfc4f02ab1469ef0a8394f3a8d6b2ec4479faec95750d62f7f8e913ace287f8

        SHA512

        1813db117f705ad9353fb2b4d20632c80c1332445ec601ce540332a0246f4fa158f0aad03dd3eaed5644aca6ee09c10c75ea3270eec88b5efc0c42e69f8f77bc

      • C:\Users\Admin\AppData\Local\Temp\nsf4632.tmp\SelfDelete.dll

        Filesize

        24KB

        MD5

        7bf1bd7661385621c7908e36958f582e

        SHA1

        43242d7731c097e95fb96753c8262609ff929410

        SHA256

        c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e

        SHA512

        8317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f

      • C:\Users\Admin\AppData\Roaming\launchers.exe

        Filesize

        24KB

        MD5

        9c77a47c78d3003a0d6135aedcbed3ac

        SHA1

        26b14138e727f4c953dbe42ed2bc08e2c7e704e7

        SHA256

        8052e39a6ec6f0f01d96b80bbbd22e8b3b6275a194de59675727f132ad63c463

        SHA512

        97fd3ee49403cf4219b0caef73803e9722cc247ad209f72a85b6d2bdbaa08549c140ae82ad53ec133fb9dafeb943736084295ab1f7e6813d7ca3a56a7d9b04a8

      • memory/4104-30-0x000002B7FDF40000-0x000002B7FDF50000-memory.dmp

        Filesize

        64KB

      • memory/4104-48-0x000002B7FE2A0000-0x000002B7FE2A1000-memory.dmp

        Filesize

        4KB

      • memory/4104-50-0x000002B7FE3B0000-0x000002B7FE3B1000-memory.dmp

        Filesize

        4KB

      • memory/4104-49-0x000002B7FE2A0000-0x000002B7FE2A1000-memory.dmp

        Filesize

        4KB

      • memory/4104-46-0x000002B7FE270000-0x000002B7FE271000-memory.dmp

        Filesize

        4KB

      • memory/4104-14-0x000002B7FDE40000-0x000002B7FDE50000-memory.dmp

        Filesize

        64KB