Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2024, 06:15

General

  • Target

    retook.exe

  • Size

    922KB

  • MD5

    c81501a4fd4475596ea7af32f4912f72

  • SHA1

    e3a9bd5bc49515f574fc8b66ef2990354aba033b

  • SHA256

    f132a441aa9375dfef0765646f60934d2b95feeb929246272df2beba61787008

  • SHA512

    aaad0a4f28e6a19ff0a201f86f889ad1462304288ff0b0fda29a54c0b28f2a67e1ae733118cff51d39a68cbf3513938918cdd80c4f88e8bc0ae6da1fe9c9b5c9

  • SSDEEP

    24576:Oyoavmlfr+8S6B/fIzgEqVGnwCE8xQuRdIFdtaL2Pv:doi0c6ZfIcEqgn/TxXdS

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\retook.exe
    "C:\Users\Admin\AppData\Local\Temp\retook.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\SysWOW64\dllhost.exe
      dllhost.exe
      2⤵
        PID:2240
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Molta.wbk
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2644
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^yNmEqrPOypxBlVnuFemmfzGnSPBDoxoqgOjuQxEteLTSbEtnlUplDSaMuqLlBkGLqxjvJsflnxbEmOwhKrzgkYbccmZQIzCQyoReaIOSFYMocOhaZnAnSameXQqpsn$" Bel.wbk
            4⤵
              PID:2432
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.com
              All.exe.com g
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.com
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.com g
                5⤵
                • Executes dropped EXE
                • Checks processor information in registry
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:2712
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\embjypotuspl.vbs"
                  6⤵
                  • Blocklisted process makes network request
                  • Modifies system certificate store
                  PID:1668
            • C:\Windows\SysWOW64\PING.EXE
              ping AILVMYUM
              4⤵
              • Runs ping.exe
              PID:2828

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        6286a0784c5abff7dbc679ee79bfd5b5

        SHA1

        b557e06380344dedc8a8811b505d643a3caf4bc6

        SHA256

        1e939f4c94a0833d8bfbd8703ab14c84b134d802f8df1a36fc1fba63dc54fbd9

        SHA512

        1540ee73abd5cc88ad32af2e37831131240f4146d00eabfb27a159729ffae897f39ec903e635fc96d8a25e91aca7366296523e95a2804e9d0bcd6f293120e17a

      • C:\Users\Admin\AppData\Local\Temp\CFAF.tmp

        Filesize

        313B

        MD5

        bee55e52500f967c3d9402e05dd57f65

        SHA1

        d8dc65ec97c6288e1fd10b8c4f8502e5a8a5bbf6

        SHA256

        b90eae4b05d321efc4519963349c1775dcea8e3b0ae53b50285545380b6539c0

        SHA512

        b8624a934fb74760f5b231ca97e89074b227ad9fe3bb08b01a81cf35760f06b346f395cf6683df5881dc429ae77af0d0a07cfeb9c9ec127e4e917191bf8c91da

      • C:\Users\Admin\AppData\Local\Temp\CabFC7A.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.com

        Filesize

        395KB

        MD5

        5d203ec516a3541ede237e7504739442

        SHA1

        f085725f6d2f369b43b8707281ef02f98d5ce531

        SHA256

        d694f80bb94a6c1e3fa77eb2149a631a825b668ebb030d463d1d61661b0d83cb

        SHA512

        8f842dd79ffb5fe68b855f904c5e832ab44e2bc90d590b12d3f699c808ad9aeb4f18200c481cffacbfbfda81389718c6ae1917cac2c8d3bdc0b5e7cc7c622e70

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.com

        Filesize

        49KB

        MD5

        6d31d0416296754c21b95884d2a78954

        SHA1

        5d953b2e713b752dc5e532b32985503aec295ae2

        SHA256

        d8344cedb684aa755d7d692e7f792644a897edd8583ef61c8f6bd66c18870090

        SHA512

        56befec830cc58704069240e1c32dacea6ff056db6278e146a3ba83691ab0f29fdaddcab39d3f07394153b9c99918eb060233b68ed18198716da6b9ec3871299

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.com

        Filesize

        103KB

        MD5

        801404f8e0ffa52b8dfed4d5e455b52e

        SHA1

        e65dcc1702e19985f7384ef625f9f9a9a31cf1b4

        SHA256

        3204ab8a6c5955f64ac3a9861324a02bfbbef6e524bfff19a0a5e29cabae1de4

        SHA512

        a137416e6390c3aaa95a994348ee0869c76c8bb946e857c3d2322811acef3dc7516b8b24eab9cad01d81da456f2f8a49b0356530630eb7e101cc14f676400e0f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Bel.wbk

        Filesize

        872KB

        MD5

        1e682e599f4aee63bc7a6594c7a36d99

        SHA1

        5b41ba7adf84b3a67d4195510ab1c8ff8d10bfc0

        SHA256

        619566d38849874a55c135ef9280cdce0df5eb05e32e576c03bf35c01241687c

        SHA512

        51f4ce897f065b21712b5f4f92f24013d0877f1b3c39dfd7ef9802c1875401daedbfc44841fa7f58a6e688b803bcbd85c8eee4b629516eee07f6842ab00c12be

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Molta.wbk

        Filesize

        466B

        MD5

        5c8a283903791aa4630e516bade66942

        SHA1

        757539d1ff447dd52394504342ac4362b68d3196

        SHA256

        fea27f988519d41f6dd26187176a859f471ec4ea2c2441d8e1dfc614535cece1

        SHA512

        95b990630d6568259b0102a6ae7b654a43eee84388a2122556841a02e5a420ec3d625d296682511ca864efae89e620733a0ce1464f8d361baa4391b291044f5a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sorridente.wbk

        Filesize

        642KB

        MD5

        6df2fef40b399f9baf72cb2fc34e8d44

        SHA1

        bd715d439f12280b4f8c207131b2e23ec0c852e6

        SHA256

        bc0f0192ba537e736834983332eb5939db8bc344e09f18e1280681dbc8726e0d

        SHA512

        20f824a2d2f088ae0843c33487f2bf35d24b82da9188e0b849a173cb62cf1eba8ab1eb911574d66f0297d5438cf32874389281d2aa90351d82b10cf48d65729a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g

        Filesize

        384KB

        MD5

        beb647de60d37feddbad9386dfb01093

        SHA1

        a830598d0002d2ebcf1b8afca35213c77c600920

        SHA256

        eca291b45848d4320ab8d8984e63f9b87715ebe2ae660242568fb00f43eabb80

        SHA512

        eb15fe271a49a22ec87bf1b7092b7fc19a4cf14158b6224067f0e4980ed9b9b911998eccb5cdc5db234349e548edec40633aba3ba915ba09e78da9f5a08a02b9

      • C:\Users\Admin\AppData\Local\Temp\TarFD29.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Users\Admin\AppData\Local\Temp\embjypotuspl.vbs

        Filesize

        145B

        MD5

        9bc3c65401a9bae369c1d9c2f83bcc6e

        SHA1

        8b4875f6c39d4d8289949d26fc2e48806c593880

        SHA256

        04652b270e4e7ecaaf423ed9e6462a6c737882b208969b52e73d6e141580f7a3

        SHA512

        2434fd55080709a5a534a87512cb602b8efab7b9cf2127d76ca1e3e8233f98d542d3b957be9cfbfc6dd89f7ccb9caa05d50648defdc5338f3efc7377496fe34e

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.com

        Filesize

        418KB

        MD5

        ea38e17bf1e5f2f87d8679c2614b7486

        SHA1

        d1879b67aa5efce4f2174028d7fad98a4b4e451d

        SHA256

        1614e5ce6450b9e49cf730aeb8e41d0e77fad41542efc3453286337ec8ff15c6

        SHA512

        604bb17897e1c7d4f1497004604aec6260ff165a1c9bcc0b4d2b8de3c8d83fa7c554aae47e27edff58c418f4eb59d2b584a76fdba1623e3bbe95b73fd078792f

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.com

        Filesize

        128KB

        MD5

        5de419f89025ec79495d1815f331a4dc

        SHA1

        ff1165ebd796ba40063b8a2693ac5b4f67aa28e3

        SHA256

        49dda37ef4ff129d2cf2cfe0612bc285f8eb0150a0b1e08b7c6af03cc0a367c7

        SHA512

        5b7f019921aaae24d7f4af1c9e846ec6362cffd61813470d5fc37f2ed1aeccebd02e24258418e1ffb32d79365db6517d30a75d0055a8584037f9f937b1c5e0fa

      • memory/2712-22-0x0000000003850000-0x0000000003877000-memory.dmp

        Filesize

        156KB

      • memory/2712-27-0x0000000003850000-0x0000000003877000-memory.dmp

        Filesize

        156KB

      • memory/2712-25-0x0000000003850000-0x0000000003877000-memory.dmp

        Filesize

        156KB

      • memory/2712-39-0x0000000003850000-0x0000000003877000-memory.dmp

        Filesize

        156KB

      • memory/2712-26-0x0000000003850000-0x0000000003877000-memory.dmp

        Filesize

        156KB

      • memory/2712-24-0x0000000003850000-0x0000000003877000-memory.dmp

        Filesize

        156KB

      • memory/2712-23-0x0000000003850000-0x0000000003877000-memory.dmp

        Filesize

        156KB

      • memory/2712-21-0x0000000003850000-0x0000000003877000-memory.dmp

        Filesize

        156KB