Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 05:30

General

  • Target

    8e5567895b53abf71a5009dae20bf557.exe

  • Size

    2.3MB

  • MD5

    8e5567895b53abf71a5009dae20bf557

  • SHA1

    2ea8acc94e7a87cac5b4e659bc0496aeccd7996c

  • SHA256

    54d212d4940739b01dd37e760c19ad1a85ffac2872d5d872c7cf859f1ebd4833

  • SHA512

    8cdd84bac1122fdb0d76c2c7aa1071eae0860e1e673827ec20ae7345e42b58d8906c894ef38f58100c835cbec766ac928193b466968fd28f61bd5a0309ed7a8c

  • SSDEEP

    49152:2W6H27a3ndBxYwHJJcFWScFZ2iNY6h9BEzQ+NTVSjdictQLW0S4:mIa3nVYwpJcsCim6/eNKjdFtQg4

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e5567895b53abf71a5009dae20bf557.exe
    "C:\Users\Admin\AppData\Local\Temp\8e5567895b53abf71a5009dae20bf557.exe"
    1⤵
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Users\Admin\AppData\Local\Temp\pk\bpk.exe
        C:\Users\Admin\AppData\Local\Temp\pk\bpk.exe
        3⤵
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Adds Run key to start application
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1264
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bpk.exe

    Filesize

    512KB

    MD5

    daef144380ffe1aead88c00bf41415cf

    SHA1

    cd28b0abd1e57d5cbd9ab96e1593d918683db281

    SHA256

    7f44a0768550a66c1471e0f85ef14385472642c93a29d7673e9fbf8a463a8d72

    SHA512

    c54026ee9938124f158185f246f54a42c589e96e8301f0d14514bb857305bad54e94fb3f44d377a3f41cb690c559e9e9276ad5bf5cc554d3ca3ca15ebe0fb932

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bpkhk.dll

    Filesize

    463KB

    MD5

    8290d1c32198942f14deab20716c4665

    SHA1

    223c7dc3756c1d7cd1821be9f39b72f3ac924639

    SHA256

    396a24c0f34960f74ec8019a5238eefe80ec89260af970fae7c3ed4a25ddcaf3

    SHA512

    2b256336d9b807aa73743a5da9c8cfe147f9f028b36b419beb7318c12bd75892d888b00ee16215557ab1046c670e15a228bdc2c8c88a82664d389ed381c52385

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bpkwb.dll

    Filesize

    523KB

    MD5

    40e1ebf3da175b4c0269007e2ebcdfbe

    SHA1

    cd405d556f119058ac87c3120d10f6a482a71706

    SHA256

    773f0f6449d10393c9d76b1134b64f397c57cf0634047850435d814c498d8813

    SHA512

    f44cca82a8f7d39e335418fe829ef4cbc7d1a5daf3a435cc393b6cd77278bc2699e8e09680fdbe81d2916d5d90e9cae976a6a53a895c4216d1c4f80a1222f29f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bulzano.jpg

    Filesize

    45KB

    MD5

    d9fa29114184866fdd8e73eb01e56f2d

    SHA1

    bbf48ce597da2859d677427e2024bcc5f2fe57ca

    SHA256

    90fb3cbe93ded239f45c24cdbbb77a001833c7f1c7ee6fe534221ac72c1b6c7f

    SHA512

    6f45415da7b5a49522480783e473129b57ff0a99ff8fe62a70df1cb6cb905462c3189d0693c66e66d3525e0e0036b99bb112077c39c13a2994093bf08489626e

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\inst.dat

    Filesize

    1KB

    MD5

    76c737561b03d17de077d14c7219fd12

    SHA1

    e2f572d63bed8230f07c708f5bee43855682fa61

    SHA256

    810e40b6fad8b878131c29c3638e2dc4d5aceae08c7f36520b180d8f34bd911d

    SHA512

    946ccc7817eba2a7e5e09ef339e83df978a04d2410806ae5f18bd9fd04342f872069e61094653a7499c037fc771dc465fb27ab60a21e90b6eabbf5cd466781b3

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\pk.bin

    Filesize

    8KB

    MD5

    16bdd9c6e974c775b6006532a744e204

    SHA1

    45848159a36ee67a2a778df506d64a2cf8d5cf45

    SHA256

    da72754e7c7afc74fc5947b0379d92dcf5bd2c717526439a447591ea28c634ef

    SHA512

    e456eddabfa75903b767a2930e96b9398e5c9cefc7d497573771deca76955b2f85917ecdc5f483e8a93189983dfca7679852c9ee16508c465e15a68be8b9c6e1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe

    Filesize

    464KB

    MD5

    32edb4fa6786a707cd69d2fea6a6fb91

    SHA1

    b134051b77125d3031442bb9b3df224fbd19de91

    SHA256

    809627e01f548178c6df8e989cecd2707035c5207f2f1a8d9de22619f53367a2

    SHA512

    18b5e100cfd7ad825b1439af1c2542bfd5e672acf39019c956496b9beccc7abc02cc4c2d4588f5fa9ee7d2e55953dbb3541636ce5ea23c1b89ecc8b2c67eee90

  • C:\Users\Admin\AppData\Local\Temp\pk\bpk.exe

    Filesize

    387KB

    MD5

    1adf4eaeec70ca1fbcfbd6a56d56ce74

    SHA1

    b8026d76c3da192390bbb8f4fd1e75b4ae1b249f

    SHA256

    b540e659540ef34314e8737d7f5f71a96ddeadf3d3afe3223f3e5b909ccd2d65

    SHA512

    269300134a3e407aa67348a3d488d760f33c505de00d9df8c84588b87d7850299dbbfb55ea98d97573e44769bad81597851d438ebdbb8f80908c96ccf2df9318

  • C:\Users\Admin\AppData\Local\Temp\pk\bpk.exe

    Filesize

    276KB

    MD5

    1401babce332d2d21cfeaf21e0a7946f

    SHA1

    5c6d1d780055f05ab8293d1f102b8c046b68d713

    SHA256

    a9054ae91d651d90d8d7c0b99c49872d8d11e3ede2dcf92cc4dafb74dc6baf9a

    SHA512

    1fa285d7c7530170f6e0b13f2366e3212156ca031a85aded868fc22063c04f2bbd77d4db4512e7a5292917bcfab8019d45ecccff2fd0608d0efcca917b208775

  • C:\Users\Admin\AppData\Local\Temp\pk\bpkhk.dll

    Filesize

    218KB

    MD5

    1b1ffd1d5c69502d4a8aad856b54ac5b

    SHA1

    1707a0dcb85359c5a9bff5fc3f46b850243721dc

    SHA256

    c21fec4806b2fe3dd01c7d043e95d24edf561eb3fd49c048aab3c9a9f1a47f2f

    SHA512

    5fbfc02c94a134e71b1dd206cdcbc185d221c3c385c2e3271393150e0166ad3ff374ec467a489fc526de4b99820c21b481f6edfd1d2186de605911a6802b8dbd

  • C:\Users\Admin\AppData\Local\Temp\pk\bpkwb.dll

    Filesize

    186KB

    MD5

    133d829f7f834af1c534e649082abfb2

    SHA1

    4488f2dae8a84460a7e9fb2a53c9a9cec3b63f15

    SHA256

    c41cd91b6b150c540ac193628f0719c385592bf80001beee74cb4dd691faae32

    SHA512

    8af8dfdf915c2ee829351f215327f9c0c9a3f1e3a4c3242faf44ffb171001527035a7715dd9108d3636f01a0386540b811a8f13f83255c6e5d83e8b20c5ea1ea

  • C:\Users\Admin\AppData\Local\Temp\pk\pk.bin

    Filesize

    8KB

    MD5

    0bf3233f6c0257b36b48e41ccce13e1b

    SHA1

    01c5638478da11520112a581a13781caaeba9662

    SHA256

    5c318bd0f9dd2891238c92fbebcc6c7f4ede4845ad95e516d0dc5f2db8bf09d6

    SHA512

    0d0d9e3a850cf3ccdfeb9d8ecdb485f07627124124aa8bc29e1e846b582c8094bc80fa3512570ea452ab55c39b2ba3c522ebf8c2f792c2728a95be123e26e799

  • C:\Users\Admin\AppData\Local\Temp\pk\rinst.exe

    Filesize

    239KB

    MD5

    0454befff6d8484817c69e10996a1dc3

    SHA1

    807b1e69c3077534392e59a3320e2948756bb019

    SHA256

    cb085222f8a3fb26d61a6f4bd140563c01e907038de7aa257fe8eb4e04958314

    SHA512

    e5ec14de40bb7946f2594dc1cb3480081d60f5a6837ed99bfbcf8c730b52d290836ba287cf79a949b910c8f323ffc46e879e75bcece2231e4897afe7013543ff

  • \Users\Admin\AppData\Local\Temp\pk\bpk.exe

    Filesize

    354KB

    MD5

    fba0c63481af070816da2e4415fca758

    SHA1

    eafa1dc264b8ebcd763529f5824027f1a3ee4d9f

    SHA256

    b6bd474559c6e9f664fabfd48052375699042b2dfefd6282546a520f36af5a9b

    SHA512

    0e37462ecef6ad32243b07a6ee258fd47bbb2272547d6fba6c7b09ee1bd7b272be60d6e59337f8414f157cd5bc774522042070016bf735af4d23eaab72f02cf3

  • \Users\Admin\AppData\Local\Temp\pk\bpkhk.dll

    Filesize

    294KB

    MD5

    4f5d2c79d05e62f9a0583388c3effd21

    SHA1

    7ced350f598e169229c24e525e12ab974a5fc5cd

    SHA256

    1a992747f22af5dd807e38820ced1021d8997a0b2b64b0dcaf08b24099eca9f4

    SHA512

    6a448dc089479fcc343b19111b0d33e97a1f5c50c2f73d82934e53ee2cea7d7c78690bd15af83d61460eb62c002c2d7b5a7b807776bcbdc0e47a0420e5fb5027

  • \Users\Admin\AppData\Local\Temp\pk\bpkhk.dll

    Filesize

    487KB

    MD5

    b9218125bfd44426c676e42941bc3601

    SHA1

    49c85e96b10f5af8f7f82a0ecccb863259a58621

    SHA256

    4db4427831d58e8c672feeb1d8dfa273435df076f8828a8f4c1e305b2f7b3411

    SHA512

    95bf0cb8a94894c362c0efa06937abd8e11cc32dc2a022e9fe44273e9ea4c0deabd9a597bbb370ff84aea1b7482d64825c348cd174216709401cc8137fa6b31a

  • \Users\Admin\AppData\Local\Temp\pk\bpkhk.dll

    Filesize

    538KB

    MD5

    c2b773f3839b275ed3cbfa45af932f5b

    SHA1

    2c5708df5dba5add986deb73a9e52f228c40625a

    SHA256

    ccb366c8cac82a57a33618779ab082cb84e9afc2e7162fc982a35935b22e3ae8

    SHA512

    e95dfc085e007e46f37fdc030009bfdc236615d859bb3121a1c2cf74791b590b186a23ee713d67f51426933e3acaa542c9171f84320510091b27b6ad16431ecd

  • \Users\Admin\AppData\Local\Temp\pk\bpkwb.dll

    Filesize

    64KB

    MD5

    ff84e8fc8279faf2d639396357d24ca2

    SHA1

    80dea5e53ad8e8924831943cde2c94b4c31a4da5

    SHA256

    17dcc69c932af07113305c1ee1936baa00ebee17beffd6094fd10aef7a7162d5

    SHA512

    3defd18f3fa5e33a9a238cc4405ba51134d9415535be3d68cad8cd2f4b6aa7b1dffa8d7e4e900f6e9706732ea219e06fb060e7e3be307a110ae6f2690f8a9981

  • memory/1264-61-0x00000000049A0000-0x0000000004ACD000-memory.dmp

    Filesize

    1.2MB

  • memory/1264-62-0x00000000049A0000-0x0000000004ACD000-memory.dmp

    Filesize

    1.2MB

  • memory/1264-129-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-125-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-58-0x0000000010000000-0x0000000010138000-memory.dmp

    Filesize

    1.2MB

  • memory/1264-45-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-121-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-117-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-113-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-60-0x0000000010000000-0x0000000010138000-memory.dmp

    Filesize

    1.2MB

  • memory/1264-109-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-76-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-105-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-101-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-97-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-93-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-89-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-85-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-69-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-53-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-81-0x0000000000400000-0x00000000005D0000-memory.dmp

    Filesize

    1.8MB

  • memory/1264-78-0x00000000049A0000-0x0000000004ACD000-memory.dmp

    Filesize

    1.2MB

  • memory/1936-70-0x0000000010000000-0x0000000010138000-memory.dmp

    Filesize

    1.2MB

  • memory/1936-64-0x0000000003400000-0x0000000003514000-memory.dmp

    Filesize

    1.1MB

  • memory/1936-73-0x0000000010000000-0x0000000010138000-memory.dmp

    Filesize

    1.2MB

  • memory/1936-72-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1936-71-0x0000000010000000-0x0000000010138000-memory.dmp

    Filesize

    1.2MB

  • memory/1936-19-0x0000000003400000-0x0000000003514000-memory.dmp

    Filesize

    1.1MB

  • memory/2664-67-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2664-66-0x0000000010000000-0x0000000010138000-memory.dmp

    Filesize

    1.2MB

  • memory/2664-65-0x0000000010000000-0x0000000010138000-memory.dmp

    Filesize

    1.2MB

  • memory/2664-74-0x0000000000DF0000-0x0000000000DF5000-memory.dmp

    Filesize

    20KB

  • memory/2664-38-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2664-27-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/2692-20-0x0000000000400000-0x0000000000514000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-24-0x0000000000400000-0x0000000000514000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-43-0x0000000005730000-0x0000000005900000-memory.dmp

    Filesize

    1.8MB

  • memory/2692-42-0x0000000000400000-0x0000000000514000-memory.dmp

    Filesize

    1.1MB

  • memory/2692-26-0x0000000005700000-0x0000000005702000-memory.dmp

    Filesize

    8KB