Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 03:19

General

  • Target

    7924b3ad929eff3bb829b98188e429cb.exe

  • Size

    175KB

  • MD5

    7924b3ad929eff3bb829b98188e429cb

  • SHA1

    76677c8ec5afd372d68685880398ecd41f398aa4

  • SHA256

    702a1abdec48dfd9725a8cbe2d21241bde50063231f4a129312e0bb02b9d8ae2

  • SHA512

    fb6e0b149c056735cd12f06f75402ba3aba031b11af99dc0a500263ef5e575196f1634e0f420bbb70cc880d151153fe955215161db05e5c181e3404d4491e5d3

  • SSDEEP

    3072:PZV/+YEUCqjwhP0rWI39ijdPEwmiNBtAIpmw8cAmqeCew2fITOrUMMnMMMMMX7Iy:P//+YEUt39ijqw/tAdw8cAy42fI7MMnD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7924b3ad929eff3bb829b98188e429cb.exe
    "C:\Users\Admin\AppData\Local\Temp\7924b3ad929eff3bb829b98188e429cb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Roaming\Muuwu\lotih.exe
      "C:\Users\Admin\AppData\Roaming\Muuwu\lotih.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3036
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp48a69729.bat"
      2⤵
        PID:588
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:2196
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1216
        • C:\Windows\system32\Dwm.exe
          "C:\Windows\system32\Dwm.exe"
          1⤵
            PID:1168
          • C:\Windows\system32\taskhost.exe
            "taskhost.exe"
            1⤵
              PID:1128
            • C:\Program Files\Windows Mail\WinMail.exe
              "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
              1⤵
              • NTFS ADS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:1684
            • C:\Windows\system32\conhost.exe
              \??\C:\Windows\system32\conhost.exe "1490771202-141092954519031994467263384751430998931-2053965036-1987747461447986233"
              1⤵
                PID:1388
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                  PID:920
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                  1⤵
                    PID:632

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                    Filesize

                    65KB

                    MD5

                    ac05d27423a85adc1622c714f2cb6184

                    SHA1

                    b0fe2b1abddb97837ea0195be70ab2ff14d43198

                    SHA256

                    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                    SHA512

                    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                    Filesize

                    34KB

                    MD5

                    26c61e2bef127290f48da8d12cb5e442

                    SHA1

                    b8aa48fb5a85091e782c0b6d0d2155f541c2385d

                    SHA256

                    ad84525afc9cafad72fa27f526d0b0bc6b0a99f868b124baae770a293f93d717

                    SHA512

                    462e21c0d2afc0297f712fb47ccd8ce21ff688db0d77430e60a138a8d1bc3d213a1e0961930805d27161573739d49503b689399cdd5b64c2292038523ceba7d6

                  • C:\Users\Admin\AppData\Roaming\Muuwu\lotih.exe

                    Filesize

                    175KB

                    MD5

                    903a51699d7d5f9d692620463edd6546

                    SHA1

                    69bc65283d6043106cf9462db733096882c1a8e6

                    SHA256

                    60bf4ec7d6ba0bd5c239659c420c0822c3f4b751de030defdd7c2dfc27e7a22e

                    SHA512

                    1e0629b27fadfd8aee80c264083feb72a23af4b199161a148c43de5093196529cbf968bd2243393fcac81fc8b7c1fe864394bdd34a9fd5d7b0aab2462cba089f

                  • C:\Users\Admin\AppData\Roaming\Xook\cooc.ozj

                    Filesize

                    366B

                    MD5

                    25364dd37d7f3b82b784312c0b4ca091

                    SHA1

                    788c477bd75ff7cb1cd3dbed4f2e5e7536761a59

                    SHA256

                    0750c18f6ebe5a3d0efcb0208a8f2dc2fb462cc2cf9a50f3aa7ee018f9f70cad

                    SHA512

                    b357685fa0f542520a8a2a01e3fcb53ae79d853c29a6cb81970d4c53e37cfb0346959855213cd5fc55cb37af81cf50c2d09abc362fdb750b4a704196dcf0d19b

                  • memory/588-215-0x0000000000050000-0x000000000007E000-memory.dmp

                    Filesize

                    184KB

                  • memory/588-216-0x0000000077550000-0x0000000077551000-memory.dmp

                    Filesize

                    4KB

                  • memory/1128-16-0x0000000002210000-0x000000000223E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1128-12-0x0000000002210000-0x000000000223E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1128-13-0x0000000002210000-0x000000000223E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1128-15-0x0000000002210000-0x000000000223E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1128-10-0x0000000002210000-0x000000000223E000-memory.dmp

                    Filesize

                    184KB

                  • memory/1168-18-0x0000000001FB0000-0x0000000001FDE000-memory.dmp

                    Filesize

                    184KB

                  • memory/1168-19-0x0000000001FB0000-0x0000000001FDE000-memory.dmp

                    Filesize

                    184KB

                  • memory/1168-20-0x0000000001FB0000-0x0000000001FDE000-memory.dmp

                    Filesize

                    184KB

                  • memory/1168-21-0x0000000001FB0000-0x0000000001FDE000-memory.dmp

                    Filesize

                    184KB

                  • memory/1216-23-0x0000000002EB0000-0x0000000002EDE000-memory.dmp

                    Filesize

                    184KB

                  • memory/1216-24-0x0000000002EB0000-0x0000000002EDE000-memory.dmp

                    Filesize

                    184KB

                  • memory/1216-25-0x0000000002EB0000-0x0000000002EDE000-memory.dmp

                    Filesize

                    184KB

                  • memory/1216-26-0x0000000002EB0000-0x0000000002EDE000-memory.dmp

                    Filesize

                    184KB

                  • memory/2196-31-0x0000000001B90000-0x0000000001BBE000-memory.dmp

                    Filesize

                    184KB

                  • memory/2196-28-0x0000000001B90000-0x0000000001BBE000-memory.dmp

                    Filesize

                    184KB

                  • memory/2196-29-0x0000000001B90000-0x0000000001BBE000-memory.dmp

                    Filesize

                    184KB

                  • memory/2196-30-0x0000000001B90000-0x0000000001BBE000-memory.dmp

                    Filesize

                    184KB

                  • memory/2924-134-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-61-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-49-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-47-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-45-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-43-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-41-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-39-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-38-0x0000000000100000-0x000000000012E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2924-37-0x0000000000100000-0x000000000012E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2924-36-0x0000000000100000-0x000000000012E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2924-35-0x0000000000100000-0x000000000012E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2924-34-0x0000000000100000-0x000000000012E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2924-53-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-55-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-57-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-59-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-51-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-63-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-67-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-69-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-0-0x0000000000960000-0x0000000000C50000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/2924-77-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-71-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-73-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-75-0x0000000077550000-0x0000000077551000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-74-0x0000000000100000-0x000000000012E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2924-65-0x0000000000170000-0x0000000000171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2924-2-0x0000000001030000-0x0000000001104000-memory.dmp

                    Filesize

                    848KB

                  • memory/2924-212-0x0000000001030000-0x0000000001104000-memory.dmp

                    Filesize

                    848KB

                  • memory/2924-213-0x0000000000100000-0x000000000012E000-memory.dmp

                    Filesize

                    184KB

                  • memory/2924-1-0x0000000001030000-0x0000000001104000-memory.dmp

                    Filesize

                    848KB

                  • memory/3036-11-0x0000000000B30000-0x0000000000E80000-memory.dmp

                    Filesize

                    3.3MB

                  • memory/3036-14-0x0000000000F50000-0x0000000001024000-memory.dmp

                    Filesize

                    848KB

                  • memory/3036-277-0x0000000000F50000-0x0000000001024000-memory.dmp

                    Filesize

                    848KB