Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 16:08

General

  • Target

    56e8c53996efc70c202ef222d3efd83f.exe

  • Size

    714KB

  • MD5

    56e8c53996efc70c202ef222d3efd83f

  • SHA1

    92ef26b759d357784dad26f421cd9c8a802ccf6d

  • SHA256

    12d5b28d22d8d902d3258d92278299836df03171df250694cf7f55f0101c216e

  • SHA512

    bb30e6cf3e8721e44a46dd9b7b3fbb6f25c5ee14ef2b96475f7b52269befefa3b92b70aeef65ef26d24a1ae4dd705f56a4902e64184e864e19e906aa42d23201

  • SSDEEP

    12288:2XUz9UXSS3Y5H1UA7WfbgIVMCeJxGoWf0N7rUSmVDzx3HDuaHi5bYC+fc8vy4hn:2FD3OVUASj1V5fpScx3HyaybYk86S

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56e8c53996efc70c202ef222d3efd83f.exe
    "C:\Users\Admin\AppData\Local\Temp\56e8c53996efc70c202ef222d3efd83f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1332
    • C:\Users\Admin\AppData\Local\Temp\bedggafdca.exe
      C:\Users\Admin\AppData\Local\Temp\bedggafdca.exe 7|8|0|6|1|0|8|2|2|7|4 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:716
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1724
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:444
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get version
        3⤵
          PID:2632
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get version
          3⤵
            PID:1364
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get version
            3⤵
              PID:1628
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 964
              3⤵
              • Program crash
              PID:4916
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 716 -ip 716
          1⤵
            PID:1652

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81705075736.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81705075736.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81705075736.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\bedggafdca.exe

            Filesize

            975KB

            MD5

            a38b75869bca5b1539b4aa47e4686abf

            SHA1

            79435a1bb8876989c48ee51eed10070cdf13609c

            SHA256

            88fb510f6fef485ae8e952d547d2137fe8a1af0c785ac707b5e4a30a9b88310c

            SHA512

            9e76a32053fda13cb4e0c75f7398cd00581186e143a02beb53a2e4cdef2ed1609f4881924da1c02020df95fd1c56da41024fed139063c781a0afb8cf9c2abbe5

          • C:\Users\Admin\AppData\Local\Temp\nsk6D03.tmp\ZipDLL.dll

            Filesize

            163KB

            MD5

            2dc35ddcabcb2b24919b9afae4ec3091

            SHA1

            9eeed33c3abc656353a7ebd1c66af38cccadd939

            SHA256

            6bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1

            SHA512

            0ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901

          • C:\Users\Admin\AppData\Local\Temp\nsk6D03.tmp\cppahhz.dll

            Filesize

            153KB

            MD5

            256a4fd5061e042b52c698808fa161cc

            SHA1

            4ab8bf6233e87efe2bc7cdce908a894854ca523c

            SHA256

            3c857fb04ef9e3ecef14cd2c6fc8e19d2b44fe699d0dc9ef1d467731a61cb916

            SHA512

            6bd24d68bad8763b4e10ab6596dd23f609319d5aa6472f408ba6ccd2bab61b7c1f514337e11963ef076d65cc4b25d0914390a3aecbd1c80b4f785a984ff8eea0