Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/01/2024, 00:06

General

  • Target

    7e5bdca7a9de1721844c83a9736f4247.exe

  • Size

    532KB

  • MD5

    7e5bdca7a9de1721844c83a9736f4247

  • SHA1

    46275c285cb45b0c86027e70f46efd5bee8de520

  • SHA256

    cd7a63b7832ec167c20e80bfa0e5868b76a783fe0ccfd94f9a0c451aa6071848

  • SHA512

    d94dba5101b7b1bdf70fcd1d22acb7322a035bcc82696f591f58d95784062e7c4c655674b2c1efdf64e072c339239384a876ca7e94764f1322c057d66dbc9751

  • SSDEEP

    12288:hDu9km32xPExY8th3idkuAgul3a9xvqBFHkadO4ceNw3c6RHRkfWdDH:tRm3YP+tRSnAgu89wmadO4ceJ0R5L

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 49 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 19 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e5bdca7a9de1721844c83a9736f4247.exe
    "C:\Users\Admin\AppData\Local\Temp\7e5bdca7a9de1721844c83a9736f4247.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\a1l8.dll"
      2⤵
        PID:2592
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\b4cb.dll"
        2⤵
          PID:2600
        • C:\Windows\SysWOW64\regsvr32.exe
          C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\8b4o.dll"
          2⤵
            PID:2656
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32\4f3r.dll"
            2⤵
              PID:2652
            • C:\Windows\SysWOW64\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32\8b4o.dll"
              2⤵
              • Loads dropped DLL
              • Installs/modifies Browser Helper Object
              • Modifies registry class
              PID:2576
            • C:\Windows\SysWOW64\bffd.exe
              C:\Windows\system32\bffd.exe -i
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2728
            • C:\Windows\SysWOW64\bffd.exe
              C:\Windows\system32\bffd.exe -s
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2464
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\841e.dll, Always
              2⤵
              • Loads dropped DLL
              PID:936
          • C:\Windows\SysWOW64\bffd.exe
            C:\Windows\SysWOW64\bffd.exe
            1⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32 C:\Windows\system32\841e.dll,Always
              2⤵
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Drops file in System32 directory
              PID:2788

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

            Filesize

            120KB

            MD5

            bdc0424724fbcaa779cca4f81e7666a6

            SHA1

            6712d6f39f09218f547e6ad61b744708f129e322

            SHA256

            d3fd4fe333428fa07a083b7f8885aac60405e9e70ecef6a2d2a08863d8be9857

            SHA512

            46c5b901d59fb3963f19a1e08495dca3c836029315a06d8793a6a92d838a3ea7383f16a81d0aeba80bd72a00b372179aa4333515a86f07ccbf4f54963abfbc6b

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

            Filesize

            257KB

            MD5

            eb26df04292eb535c1c29a6e4a755587

            SHA1

            a37e222819e059bf695874473e99e09db49fd3c3

            SHA256

            1299225ac1ce5fee371ea9017ee55359cd3bce5c827db0c22d71db3f6964def6

            SHA512

            45001759225e06b7300524dd09ef2105a3cd7540466e93e6841c302b570310b4202152e7fa7f82f1658af35401b85260eda2834985e965817ed8d401542c33b5

          • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\s.exe

            Filesize

            172KB

            MD5

            50f6a9caa5c03dce661e579b37b764d5

            SHA1

            eb6ccac84ce01689aa2a9bc4d97241fbe57041a4

            SHA256

            edbd4cf1306ac2cf6cad35579ee3dcb00a7450b6dfbd8d330928442dc4c10a6e

            SHA512

            20e201bd75abc8c1d48b6d2e4aeb0f1111c3f7d5dbc479a718da772679e071ecc7e1b700e1c6918cf5bf5911e1f0d1296e14296236ac9c34c0865db536045f11

          • C:\Windows\SysWOW64\841e.dll

            Filesize

            480KB

            MD5

            bc135d3fe109d845e1214cf27d8440dd

            SHA1

            6dfdac553856a77a85d95e9a3846f31d9a24e094

            SHA256

            5dfb0e47fd703915ff84d773c93c43f597046223ba1d038b50ea622b89df6e22

            SHA512

            695a23f3d2c45f4ac588785e003ff1c2cd079b9193656276fe49b3c492ec9090b86a5da716d53b5952da90f44f5eb6a8014172e4e96c6c4e6ecc582b553292fb