Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 17:11

General

  • Target

    Funshion/Funshion.exe

  • Size

    2.7MB

  • MD5

    12c92913e1e2f029be52e0f3103c3c16

  • SHA1

    27c755028045ba0304033a68121a255482aa7bf7

  • SHA256

    d1faf8d2282bbe2f15715f703076a145f0c64e3b8c7d2f6f966ad9bcce9f463f

  • SHA512

    48baa2229cc6c63991fb6a471ab3043f877da6b2dbfeb9a1196a2a6237386621ac4f240d2752c463f17a49f3d0d74716cb0f9009ea3d55efef101644a1fb391d

  • SSDEEP

    49152:xJUfDTk1VsrS2tOWQMtXDeN0y7lBnvrOqyd+gsAnT6LAsr:snkjq/DeN0yH6q0+lLAo

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Funshion\Funshion.exe
    "C:\Users\Admin\AppData\Local\Temp\Funshion\Funshion.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\Funshion\XPSP2Patch\evid4226-vc80-mt.exe
      --silent
      2⤵
        PID:2636
      • C:\Windows\SysWOW64\dxdiag.exe
        dxdiag.exe /whql:off /t C:\Users\Admin\funshion\fsdxdiag.txt
        2⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:828
      • C:\Windows\SysWOW64\tracert.exe
        tracert.exe -d -h 16 -w 800 209.131.36.158
        2⤵
          PID:2156

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4R90HQQX\errorPageStrings[2]

        Filesize

        2KB

        MD5

        e3e4a98353f119b80b323302f26b78fa

        SHA1

        20ee35a370cdd3a8a7d04b506410300fd0a6a864

        SHA256

        9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66

        SHA512

        d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

      • C:\Users\Admin\AppData\Local\Temp\Funshion\funshion.ini

        Filesize

        129B

        MD5

        252c55e068d62fbe2ba1932dd83ac40c

        SHA1

        b2ab22f5e407dc62c65be2e968a2cab6d79782e1

        SHA256

        40c2bb267f04ece42442d4fc62538d95ff8d50176c5063114e9bbbb91d84d281

        SHA512

        44fd6a5ed6bcecfe7f24439d7881ded7bed956f9bdc1c9c7134541f3a0b1ebe86ecbcd230a902cd4c7faa59d1d361c8336d8b3d73e849f79c224b1a33e20ddf1

      • C:\Users\Admin\AppData\Local\Temp\Funshion\funshion.ini

        Filesize

        156B

        MD5

        096aed8d4981b0d4c64695a05fc83a6d

        SHA1

        072ee3334d2dbf2a72b32763bf2207f1ebe91369

        SHA256

        88fd6ab7ad01eb9a8e15c4950fc44b9a6549c35640175fa62313f556ecd9790a

        SHA512

        8cceacc4da9e10ab38842ad66ccd3b9bef0bc43186cd0fafb189769ae38ffefb54fcb01a7e4db5b6cbde273da963fbbceef038a959efcb367e3795175ad61328

      • C:\Users\Admin\AppData\Local\Temp\Funshion\funshion.ini

        Filesize

        72B

        MD5

        d4e46d8d02f0ef65cf60a1a3723ba70f

        SHA1

        ceb19e356594a07f7811e1ef811fccd935dc1b4e

        SHA256

        abf8143c836df5bafe398cc275b02d840813d93f7a40ccd642d01f9ec9a3b646

        SHA512

        b2e9a8b5356a001b15676251cc9e99cb5a2f28e2e350eb3539b39485fe0b2408c30e131cd5e1e999e7f24640e14b4fcf0e3061d716008dc32884759cae8d9d74

      • C:\Users\Admin\FunShion.ini

        Filesize

        192B

        MD5

        18cbc1233d905de963c2966d548c38b6

        SHA1

        4fdb3b64e335a57595ff51e09953994fc58f2da7

        SHA256

        233a8d5c4e6de7a9a564293006b183427676e6baef14c1ae2a01a63549f76260

        SHA512

        4f23205421b0f697422e6710239ddf534473c94a5a09a8466537723928120ed8418e77e191c1f5ca8008cf8338ded24c1d7b09ab3e2d51fb790c3e603c3344c6

      • C:\Users\Admin\FunShion.ini

        Filesize

        238B

        MD5

        97351ac65a77734ddaa0fda64f881fdd

        SHA1

        850fcba4a29ab5fcc3fc731ce677d1f9a0c32889

        SHA256

        e558d4cfbd9d7ccb7fbe693386302445639a68c4ff3db900e6c0e6dcfbf5d3d6

        SHA512

        6caa396c70508d4e8613068a240aadd1c684d1ff0b75520c3521d9f991e51a47d11a78a9bb449d09f5aab6c4f59e5134544ec97843efd70859a1218fbfab20e6

      • C:\Users\Admin\FunShion.ini

        Filesize

        320B

        MD5

        99c5959bff131001dd76be3dca5ce7d0

        SHA1

        9f098ddf36edbb7ae84ee071d9819ba8306be4f9

        SHA256

        64323a6d7c6d9910f28b1a0cfa9019549dc1da164b5152ebb3800a37976dfe83

        SHA512

        a272119e4ce883c09c42e7d8e430d20d0db5551ee2b97926d24933c9a1ce9e7f42be2cfdc880d5a0131cbf1ae4e0a5bfc7d7295cd853e15eb7d74900e3933b72

      • C:\Users\Admin\FunShion.ini

        Filesize

        65B

        MD5

        098663c45b01751b04762fc0673f566c

        SHA1

        6d746d9355e37feb05df8f47121b1ea57f5feced

        SHA256

        8d1ff906f8fecd9c5e66d49a309dcb45eb923ece244d9c299ce9ffe3d4b0ca09

        SHA512

        028b3dbf32756d01be54df786d50ad941a6a7ca033863d7b4c696be62cfd1a1701b598ff9a761f073821237f395bcf21edf479ef609a66a1ae7c62b95210c356

      • C:\Users\Admin\FunShion.ini

        Filesize

        84B

        MD5

        09c482888fbc41e0e24af137c684f47f

        SHA1

        94598fb470baafcb34eaa68271a7292481e0101d

        SHA256

        427ab42b688fa370cff14cc83d0c0a1b87453e0368b4ceb67b87f3c45934de60

        SHA512

        6ffb3544b7a680d02e7f8fd9b46382bc4cf449e8545624be27cb8e9799b3b09da7e371dffba3db015d2f77f13d37c0c82efe271fcece222a7cd6c89a2618a1e2

      • memory/828-200-0x0000000001EC0000-0x0000000001F1C000-memory.dmp

        Filesize

        368KB

      • memory/828-202-0x0000000001EC0000-0x0000000001EEA000-memory.dmp

        Filesize

        168KB

      • memory/828-211-0x0000000001EC0000-0x0000000001EEA000-memory.dmp

        Filesize

        168KB

      • memory/828-203-0x0000000001EC0000-0x0000000001EEA000-memory.dmp

        Filesize

        168KB

      • memory/828-199-0x0000000001EC0000-0x0000000001F1C000-memory.dmp

        Filesize

        368KB

      • memory/828-197-0x0000000000360000-0x000000000036A000-memory.dmp

        Filesize

        40KB

      • memory/828-196-0x0000000000360000-0x000000000036A000-memory.dmp

        Filesize

        40KB

      • memory/828-198-0x0000000000360000-0x000000000036A000-memory.dmp

        Filesize

        40KB

      • memory/2192-106-0x0000000004B90000-0x0000000004ED6000-memory.dmp

        Filesize

        3.3MB

      • memory/2192-97-0x0000000002280000-0x0000000002281000-memory.dmp

        Filesize

        4KB

      • memory/2192-149-0x0000000005260000-0x0000000005275000-memory.dmp

        Filesize

        84KB

      • memory/2192-133-0x00000000051F0000-0x000000000525B000-memory.dmp

        Filesize

        428KB

      • memory/2192-205-0x0000000002280000-0x0000000002281000-memory.dmp

        Filesize

        4KB

      • memory/2192-150-0x0000000005B10000-0x0000000005BA4000-memory.dmp

        Filesize

        592KB

      • memory/2192-81-0x0000000002570000-0x000000000259E000-memory.dmp

        Filesize

        184KB

      • memory/2192-79-0x0000000000860000-0x000000000087B000-memory.dmp

        Filesize

        108KB