Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/01/2024, 12:43

General

  • Target

    72454051b03c281f006cd3f8e88426b3.exe

  • Size

    673KB

  • MD5

    72454051b03c281f006cd3f8e88426b3

  • SHA1

    05bfa914bd7b1b64ffbf0bba9bd8ee78e17956b7

  • SHA256

    5998bc5d720691c9a28f1c3d2fafb55195be1a1afdda292064d9fb9aef9ae04b

  • SHA512

    d13cde9152191dacb811a81831a5106b2ccec49c6a366aabe4254f99d628f867bc4b64747c958dbdfe4321b70a811b2d46e21cd33925697fc5395d22920d7a46

  • SSDEEP

    12288:JMnBszy90Q7YX+CFTc5GDnbu/qmvSBjh+4nqjuwNhyiIgf96rNiBW:wszyUTmGf8Dv2VLqNNhyilYrNi

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72454051b03c281f006cd3f8e88426b3.exe
    "C:\Users\Admin\AppData\Local\Temp\72454051b03c281f006cd3f8e88426b3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
          4⤵
          • Adds policy Run key to start application
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3172
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3024
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f
              6⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:5108
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3688
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              6⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:1288
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4656
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe:*:Enabled:Windows Messanger" /f
              6⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:932
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:736
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              6⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:4256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4304
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe

    Filesize

    815KB

    MD5

    e61f67a82de9698a6d2818854d1ea304

    SHA1

    356eabfd06603dc107c3d4a9f4ecbe677edaf54e

    SHA256

    be9e5583d4dbfda326b88d1e6e13c5e4379a10f4170216898f26f8e0d9149b7a

    SHA512

    c431604684a320046e1f35a16cf59d3665cda58a72f17f225363a8922d3e0dbfb49a5e09976625310ae4645fd9cb87490744ef205138168acdc4af74e9854833

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe

    Filesize

    857KB

    MD5

    79c9a819093896771d52015e5b64b44d

    SHA1

    98c777688e5e221e2522b3776709494b6f0070e5

    SHA256

    d5fd75950ecf1c58b47c3c6c84f6506f8ca0a8a9270318702a6b6b67c674436d

    SHA512

    6e22fc8df35b6a54de5828a77d9b700324c314019499e74aa0aff97ae4ea2aeae9eb366d553575ca9f9996a1f55f704058438bf65924369636e066c010c1f4a3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe

    Filesize

    1024KB

    MD5

    8b0075d01feddc0e208f8f2aae108b7f

    SHA1

    6053422705f97eaada22b36f18fce84d25b52122

    SHA256

    2f91707c2f568417938f4aea7783e4056f573675440af224e02c5961ad071832

    SHA512

    f476e00f2fae5fb4c9914b52ea6f54f58c9bd26d4e2c2ee97837e1be84498f73fd65293366dd3bd4f3b39425eec7a9826312d0347d2de96290467ab4a86e247c

  • C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe

    Filesize

    722KB

    MD5

    08f4fc93058ef8c21dfabb41fe0c54e6

    SHA1

    5ca66f8c880b2fac564347600a206a75cd8ead2d

    SHA256

    c06e44c8accf36458041fe21fb2d29750e19e35f3b862ebcb9f3ac1432d835d0

    SHA512

    b028a70f93204b143a7257abdaa4b21a69bccb7fcce5dfc17a702c802c0e3fa37dc19a4bb5472a5fed8eb26a283466b46a552d6688a8b306a7a2cac7e4741bd5

  • memory/900-48-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2480-8-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2480-11-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2480-24-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2936-5-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/3172-50-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-56-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-31-0x0000000076EF6000-0x0000000076EF7000-memory.dmp

    Filesize

    4KB

  • memory/3172-30-0x0000000074F30000-0x0000000074FAA000-memory.dmp

    Filesize

    488KB

  • memory/3172-96-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-93-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-21-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-18-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-53-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-54-0x0000000074E40000-0x0000000074F30000-memory.dmp

    Filesize

    960KB

  • memory/3172-55-0x0000000074F30000-0x0000000074FAA000-memory.dmp

    Filesize

    488KB

  • memory/3172-29-0x0000000074E40000-0x0000000074F30000-memory.dmp

    Filesize

    960KB

  • memory/3172-60-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-63-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-66-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-70-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-73-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-76-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-80-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-83-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-86-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/3172-90-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/4304-43-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/4304-38-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB