Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
56e8c53996efc70c202ef222d3efd83f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56e8c53996efc70c202ef222d3efd83f.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ZipDLL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/cppahhz.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/cppahhz.dll
Resource
win10v2004-20231215-en
General
-
Target
56e8c53996efc70c202ef222d3efd83f.exe
-
Size
714KB
-
MD5
56e8c53996efc70c202ef222d3efd83f
-
SHA1
92ef26b759d357784dad26f421cd9c8a802ccf6d
-
SHA256
12d5b28d22d8d902d3258d92278299836df03171df250694cf7f55f0101c216e
-
SHA512
bb30e6cf3e8721e44a46dd9b7b3fbb6f25c5ee14ef2b96475f7b52269befefa3b92b70aeef65ef26d24a1ae4dd705f56a4902e64184e864e19e906aa42d23201
-
SSDEEP
12288:2XUz9UXSS3Y5H1UA7WfbgIVMCeJxGoWf0N7rUSmVDzx3HDuaHi5bYC+fc8vy4hn:2FD3OVUASj1V5fpScx3HyaybYk86S
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 716 bedggafdca.exe -
Loads dropped DLL 2 IoCs
pid Process 1332 56e8c53996efc70c202ef222d3efd83f.exe 1332 56e8c53996efc70c202ef222d3efd83f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4916 716 WerFault.exe 89 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1724 wmic.exe Token: SeSecurityPrivilege 1724 wmic.exe Token: SeTakeOwnershipPrivilege 1724 wmic.exe Token: SeLoadDriverPrivilege 1724 wmic.exe Token: SeSystemProfilePrivilege 1724 wmic.exe Token: SeSystemtimePrivilege 1724 wmic.exe Token: SeProfSingleProcessPrivilege 1724 wmic.exe Token: SeIncBasePriorityPrivilege 1724 wmic.exe Token: SeCreatePagefilePrivilege 1724 wmic.exe Token: SeBackupPrivilege 1724 wmic.exe Token: SeRestorePrivilege 1724 wmic.exe Token: SeShutdownPrivilege 1724 wmic.exe Token: SeDebugPrivilege 1724 wmic.exe Token: SeSystemEnvironmentPrivilege 1724 wmic.exe Token: SeRemoteShutdownPrivilege 1724 wmic.exe Token: SeUndockPrivilege 1724 wmic.exe Token: SeManageVolumePrivilege 1724 wmic.exe Token: 33 1724 wmic.exe Token: 34 1724 wmic.exe Token: 35 1724 wmic.exe Token: 36 1724 wmic.exe Token: SeIncreaseQuotaPrivilege 1724 wmic.exe Token: SeSecurityPrivilege 1724 wmic.exe Token: SeTakeOwnershipPrivilege 1724 wmic.exe Token: SeLoadDriverPrivilege 1724 wmic.exe Token: SeSystemProfilePrivilege 1724 wmic.exe Token: SeSystemtimePrivilege 1724 wmic.exe Token: SeProfSingleProcessPrivilege 1724 wmic.exe Token: SeIncBasePriorityPrivilege 1724 wmic.exe Token: SeCreatePagefilePrivilege 1724 wmic.exe Token: SeBackupPrivilege 1724 wmic.exe Token: SeRestorePrivilege 1724 wmic.exe Token: SeShutdownPrivilege 1724 wmic.exe Token: SeDebugPrivilege 1724 wmic.exe Token: SeSystemEnvironmentPrivilege 1724 wmic.exe Token: SeRemoteShutdownPrivilege 1724 wmic.exe Token: SeUndockPrivilege 1724 wmic.exe Token: SeManageVolumePrivilege 1724 wmic.exe Token: 33 1724 wmic.exe Token: 34 1724 wmic.exe Token: 35 1724 wmic.exe Token: 36 1724 wmic.exe Token: SeIncreaseQuotaPrivilege 444 wmic.exe Token: SeSecurityPrivilege 444 wmic.exe Token: SeTakeOwnershipPrivilege 444 wmic.exe Token: SeLoadDriverPrivilege 444 wmic.exe Token: SeSystemProfilePrivilege 444 wmic.exe Token: SeSystemtimePrivilege 444 wmic.exe Token: SeProfSingleProcessPrivilege 444 wmic.exe Token: SeIncBasePriorityPrivilege 444 wmic.exe Token: SeCreatePagefilePrivilege 444 wmic.exe Token: SeBackupPrivilege 444 wmic.exe Token: SeRestorePrivilege 444 wmic.exe Token: SeShutdownPrivilege 444 wmic.exe Token: SeDebugPrivilege 444 wmic.exe Token: SeSystemEnvironmentPrivilege 444 wmic.exe Token: SeRemoteShutdownPrivilege 444 wmic.exe Token: SeUndockPrivilege 444 wmic.exe Token: SeManageVolumePrivilege 444 wmic.exe Token: 33 444 wmic.exe Token: 34 444 wmic.exe Token: 35 444 wmic.exe Token: 36 444 wmic.exe Token: SeIncreaseQuotaPrivilege 444 wmic.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1332 wrote to memory of 716 1332 56e8c53996efc70c202ef222d3efd83f.exe 89 PID 1332 wrote to memory of 716 1332 56e8c53996efc70c202ef222d3efd83f.exe 89 PID 1332 wrote to memory of 716 1332 56e8c53996efc70c202ef222d3efd83f.exe 89 PID 716 wrote to memory of 1724 716 bedggafdca.exe 91 PID 716 wrote to memory of 1724 716 bedggafdca.exe 91 PID 716 wrote to memory of 1724 716 bedggafdca.exe 91 PID 716 wrote to memory of 444 716 bedggafdca.exe 95 PID 716 wrote to memory of 444 716 bedggafdca.exe 95 PID 716 wrote to memory of 444 716 bedggafdca.exe 95 PID 716 wrote to memory of 2632 716 bedggafdca.exe 97 PID 716 wrote to memory of 2632 716 bedggafdca.exe 97 PID 716 wrote to memory of 2632 716 bedggafdca.exe 97 PID 716 wrote to memory of 1364 716 bedggafdca.exe 99 PID 716 wrote to memory of 1364 716 bedggafdca.exe 99 PID 716 wrote to memory of 1364 716 bedggafdca.exe 99 PID 716 wrote to memory of 1628 716 bedggafdca.exe 101 PID 716 wrote to memory of 1628 716 bedggafdca.exe 101 PID 716 wrote to memory of 1628 716 bedggafdca.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\56e8c53996efc70c202ef222d3efd83f.exe"C:\Users\Admin\AppData\Local\Temp\56e8c53996efc70c202ef222d3efd83f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\bedggafdca.exeC:\Users\Admin\AppData\Local\Temp\bedggafdca.exe 7|8|0|6|1|0|8|2|2|7|4 KEhJPjwxMTE0LBwoS1U8T0k8Oy4ZK0c9VFFOUkNHQjYtHiowanFvXHNhbWpaZWU3UWVha19gYRknRENSVEFCOyszMCkyGi5DQUI7KRwoSFJJQ1U7Ul1CQDYqNjMzMxgtUT5OTz1SWVRSRDtmbXBpMi8pcnJuLEI+T0QlVElPLTlOTidFRz5PGi5DREdBREU9NSApQzE1Ky8ZKz0qPScwICdCMTYpKhgvPjM9JS8eKEAuNS0rHy9IUE09UTxMX0pRSU4/QVI5GSdQTE5ETUFSWEFOREE3Hy9IUE09UTxMX0hATT07HihBUT1fT1FMNR4tPlQ+V0NHQ0xBTEM2HChAT01TXzpQTVBPPko9Lx8vTEY/R0dSR1VZVFJEOx4oUkY1MhouREsvOxkrS01OTkhNPV1VPkg8R00/SE05RUNOTkU1IClIU1dQU0dQQkVFN3NybWMeKE4+TFVMTUlGRV1OTz5KXz5AWUs7MBkrQUFEP1c9KR4tQk9YPFlIQE1BQV0+SjxKWUpTRTw7ZFpobF0gKUNPT0xKSD09V0lKPDEvNiwuMycrMSg0OBgtTjpOOkRMP0tfQUxRTT1FRD1gYGxrYx4oUEJFRTcwNCs0NCk1LSw2Gi5ER1VMRUs6PF9OSE09OzUoLSonMiowNSIvLjMtKTI0MClBRQ==2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get version3⤵PID:2632
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get version3⤵PID:1364
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81705075736.txt bios get version3⤵PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 9643⤵
- Program crash
PID:4916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 716 -ip 7161⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
975KB
MD5a38b75869bca5b1539b4aa47e4686abf
SHA179435a1bb8876989c48ee51eed10070cdf13609c
SHA25688fb510f6fef485ae8e952d547d2137fe8a1af0c785ac707b5e4a30a9b88310c
SHA5129e76a32053fda13cb4e0c75f7398cd00581186e143a02beb53a2e4cdef2ed1609f4881924da1c02020df95fd1c56da41024fed139063c781a0afb8cf9c2abbe5
-
Filesize
163KB
MD52dc35ddcabcb2b24919b9afae4ec3091
SHA19eeed33c3abc656353a7ebd1c66af38cccadd939
SHA2566bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1
SHA5120ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901
-
Filesize
153KB
MD5256a4fd5061e042b52c698808fa161cc
SHA14ab8bf6233e87efe2bc7cdce908a894854ca523c
SHA2563c857fb04ef9e3ecef14cd2c6fc8e19d2b44fe699d0dc9ef1d467731a61cb916
SHA5126bd24d68bad8763b4e10ab6596dd23f609319d5aa6472f408ba6ccd2bab61b7c1f514337e11963ef076d65cc4b25d0914390a3aecbd1c80b4f785a984ff8eea0