Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2024, 01:36

General

  • Target

    7118cd5e43a0af7092797efa4e6da662.exe

  • Size

    689KB

  • MD5

    7118cd5e43a0af7092797efa4e6da662

  • SHA1

    d670b3ef58cab5d5ed27df6413e797c75d9a7ee3

  • SHA256

    dc47692645a36b354b588cefe91edadc1c1c6eff4cf7e6b144d78d34f5c1c5a6

  • SHA512

    13b98a6de6980ae7d34d610d0495569a262a2ad87da36d92801b4d609228b4e39130a9d6e31b016d8a54a90b6eefced6f37a195424ebcf7bd9c05c5a6ae57b51

  • SSDEEP

    12288:5Eg8+X4o/paFYJJuWNKs8LOwriTsyUF3Z4mxx4JP9POp1IO7GcDWxbgI:L8/o/cFY7gLjuTaQmX4/POp6O7GcDAbt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7118cd5e43a0af7092797efa4e6da662.exe
    "C:\Users\Admin\AppData\Local\Temp\7118cd5e43a0af7092797efa4e6da662.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2224
  • C:\Windows\Hacker.com.cn.ini
    C:\Windows\Hacker.com.cn.ini
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe

      Filesize

      788KB

      MD5

      66ef3fed18f6e5bed7fbacbb4d0247d3

      SHA1

      ba58f3d594a737e87f3e4938d26cae831d45dd8a

      SHA256

      c2a1476196712e9e1e5d8624a12b4c5529132755c44773bba49c87a9eacfd630

      SHA512

      bf2dea45fde8387d77941ea2e87f10497982a0362532c31514ee0d04c4fdf4b9d7d29062a35559fdfa895591e45c54df3c68eb77fa460c734ccd4718da72bcac

    • memory/1992-10-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/1992-26-0x00000000009F0000-0x00000000009F1000-memory.dmp

      Filesize

      4KB

    • memory/1992-3-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1992-7-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/1992-6-0x0000000000710000-0x0000000000711000-memory.dmp

      Filesize

      4KB

    • memory/1992-8-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/1992-9-0x0000000000280000-0x0000000000281000-memory.dmp

      Filesize

      4KB

    • memory/1992-0-0x0000000001000000-0x0000000001110000-memory.dmp

      Filesize

      1.1MB

    • memory/1992-11-0x0000000000720000-0x0000000000721000-memory.dmp

      Filesize

      4KB

    • memory/1992-12-0x0000000000790000-0x0000000000791000-memory.dmp

      Filesize

      4KB

    • memory/1992-14-0x00000000007C0000-0x00000000007C1000-memory.dmp

      Filesize

      4KB

    • memory/1992-13-0x0000000000770000-0x0000000000771000-memory.dmp

      Filesize

      4KB

    • memory/1992-16-0x0000000000740000-0x0000000000741000-memory.dmp

      Filesize

      4KB

    • memory/1992-15-0x0000000000750000-0x0000000000751000-memory.dmp

      Filesize

      4KB

    • memory/1992-17-0x00000000007B0000-0x00000000007B1000-memory.dmp

      Filesize

      4KB

    • memory/1992-1-0x0000000000290000-0x00000000002E4000-memory.dmp

      Filesize

      336KB

    • memory/1992-2-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/1992-27-0x0000000000760000-0x0000000000761000-memory.dmp

      Filesize

      4KB

    • memory/1992-18-0x00000000007A0000-0x00000000007A1000-memory.dmp

      Filesize

      4KB

    • memory/1992-28-0x0000000000A60000-0x0000000000A61000-memory.dmp

      Filesize

      4KB

    • memory/1992-29-0x0000000000A40000-0x0000000000A41000-memory.dmp

      Filesize

      4KB

    • memory/1992-30-0x0000000000A20000-0x0000000000A21000-memory.dmp

      Filesize

      4KB

    • memory/1992-31-0x0000000000A10000-0x0000000000A11000-memory.dmp

      Filesize

      4KB

    • memory/1992-32-0x0000000000A80000-0x0000000000A81000-memory.dmp

      Filesize

      4KB

    • memory/1992-33-0x0000000000A70000-0x0000000000A71000-memory.dmp

      Filesize

      4KB

    • memory/1992-34-0x0000000000730000-0x0000000000740000-memory.dmp

      Filesize

      64KB

    • memory/1992-44-0x0000000000290000-0x00000000002E4000-memory.dmp

      Filesize

      336KB

    • memory/1992-43-0x0000000001000000-0x0000000001110000-memory.dmp

      Filesize

      1.1MB

    • memory/2224-42-0x0000000000400000-0x00000000004CE000-memory.dmp

      Filesize

      824KB

    • memory/2224-35-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/3000-41-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/3000-45-0x0000000000400000-0x00000000004CE000-memory.dmp

      Filesize

      824KB

    • memory/3000-47-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB