Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/01/2024, 05:57

General

  • Target

    73e85ca2be0c780510f17b4d7620d802.exe

  • Size

    753KB

  • MD5

    73e85ca2be0c780510f17b4d7620d802

  • SHA1

    eeb71556aef088a6881a62823a6a84e99c2b1105

  • SHA256

    2490184d336357af2480d093a42478fe41240b1bf59606e968ad1fbf45f8114c

  • SHA512

    1bfc7150809ad3b43c97deedb038964278c4428e9157056b4597f6af5693de672876ccfc5bb41476f9fac4de34ca7a6057f14b8bc02feeb29f4e2b5b4507a9b5

  • SSDEEP

    12288:0gqOgRUbKNg++JTk6+QmgsxeVDpjMeP9vYtHqcNqPI9n2hTRKfNufc8vy4hp:0gqdRUWNmTk65Z9jytHqIqQ9n4lKlL8h

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73e85ca2be0c780510f17b4d7620d802.exe
    "C:\Users\Admin\AppData\Local\Temp\73e85ca2be0c780510f17b4d7620d802.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:404
    • C:\Users\Admin\AppData\Local\Temp\beddjafdca.exe
      C:\Users\Admin\AppData\Local\Temp\beddjafdca.exe 2!0!8!1!3!3!8!9!3!2!9 LVBBQzouMSozMRctU01BTUY8NC0eJkxFTFZMT0NAQTsoIzIob29sXGxgcmVfbV08T2JhZF5lXB4vPEhQUUE7OjAuNTEqHyxAQTs6LhctUEpOQVI7S1xHOzsyLjgxMBgmUENJVEVKXlJPRDRlcmtuOicucG9uJUFDSkktTE5NKjlHTSxATEZHHyxAREBASUBCPRguQS41JC4eJkIyNSwuHSc7MDskLyAnQzE6JSgdLTszPSUwHSxISUxCTEFUV09PRk44QFc0Hi9IUUxBTTpRXTxTTDk8HSxISUxCTEFUV00+Sj00HS08VkVXVE9JNRcsQ09DXztMQUlBRUI7Fy1IR1JRXDpJTFVKQ1I1NB0sTD8+TEJXT01eUk9ENB0tTUs9Kh8sQUsoOh4mUFVGU0ZKPVZUQ0NBT0VERko5PkJTSUo9GC5GUFdJUkxLR009PHFvbVwdLUlDVE1RS0ZGPlxTSkNSV0M+Vks0Lx4mRkk8RFU6KRcsR0pdRFFNPkpBOlxDRUFSUU9RQjw0Y19jcWUYLkFMT0VJTThCX0FPOi4oKisxLiwyKDArNTEXLFJAS0U1MDEwKzAuMyozNhguQUxPRUlNOEJfTEhKQjUtLC8nLTIoMDInLTExNzEvNiJASg==
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3916
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81706162247.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:468
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81706162247.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2524
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81706162247.txt bios get version
        3⤵
          PID:4660
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81706162247.txt bios get version
          3⤵
            PID:884
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81706162247.txt bios get version
            3⤵
              PID:2928
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 968
              3⤵
              • Program crash
              PID:2756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3916 -ip 3916
          1⤵
            PID:1668

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81706162247.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81706162247.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81706162247.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\beddjafdca.exe

            Filesize

            814KB

            MD5

            4bc90a0d8fbe03474a421965d3608133

            SHA1

            ece5858bbb779afd33a74ef7e51c186ef0c80fe5

            SHA256

            fd60a16942523a9a5f64241ef59739a37d86f8eff53a7562f496bf9bc530564f

            SHA512

            ea7f2cb7f1f0f67bf0bcda56ef1a04d4de27bd70c92c8b60fa050fef6eab20c6b95cb754bea324ee5cdb5037d8fa873132df8b5b2564c4d97ae267066fbc02f6

          • C:\Users\Admin\AppData\Local\Temp\beddjafdca.exe

            Filesize

            1.2MB

            MD5

            828db2e194dd94681679ba8a6190afaf

            SHA1

            9df6ad9f15c66fd16447d31fdf702cdf357bacb5

            SHA256

            9f132fbf56015410106863b116c983c230b50f9edeb5c7ab02d99c3e8ea4e7b3

            SHA512

            842517ba3622b44ed22413254ab634c0392e4f307f871135ac9148801c589e686e449009535350c5c622988c4bae4d1fbd356cff76388d3212f4f1e9a31f32ff

          • C:\Users\Admin\AppData\Local\Temp\nsb6F36.tmp\ZipDLL.dll

            Filesize

            163KB

            MD5

            2dc35ddcabcb2b24919b9afae4ec3091

            SHA1

            9eeed33c3abc656353a7ebd1c66af38cccadd939

            SHA256

            6bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1

            SHA512

            0ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901

          • C:\Users\Admin\AppData\Local\Temp\nsb6F36.tmp\jkmxtii.dll

            Filesize

            158KB

            MD5

            b494208d857adf16f64eee4887720973

            SHA1

            e254c004a55d3dc5f3e928aa85f29c829f1b210c

            SHA256

            da43bf45c498988d7658d66967d45bfc37f522e4a79b05b7c63cf6caafb3b916

            SHA512

            737b21bccbdbe8fde3a7d79d28bc3d1895a0025fb8747b72e50142b65acfa69515c68c6d03bb5409a684f159e35b9700d7fc1f916a5d6cbae3ca8cb67855f273