Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 03:41

General

  • Target

    9862c8d1ed05b1f41aa58ffcd621c0c7.exe

  • Size

    556KB

  • MD5

    9862c8d1ed05b1f41aa58ffcd621c0c7

  • SHA1

    b367426011a95facc927718018b7b214a40af948

  • SHA256

    d000d9b44f81d02f49b76aea429c502c770834a29d9b2794e8d109e3b572f118

  • SHA512

    5c07982b036fe7f1257d3c3a7d49556d69dd32abb04b4f6821a2156670122bf2f9a8a2234d0f48541eb358d94fecab2e91d859675de25638dd0813c90458d37f

  • SSDEEP

    6144:twkajyiWz7KXsS5sTqPBpJdGE1zk08aR7xR3p73hwV:ujyfHSmbEp18aRdD0

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9862c8d1ed05b1f41aa58ffcd621c0c7.exe
    "C:\Users\Admin\AppData\Local\Temp\9862c8d1ed05b1f41aa58ffcd621c0c7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\9862c8d1ed05b1f41aa58ffcd621c0c7.exe
      C:\Users\Admin\AppData\Local\Temp\9862c8d1ed05b1f41aa58ffcd621c0c7.exe
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2496
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2824
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:5518339 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2632
      • C:\Windows\svcr.exe
        "C:\Windows\svcr.exe" "C:\Users\Admin\AppData\Local\Temp\9862c8d1ed05b1f41aa58ffcd621c0c7.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\svcr.exe
          C:\Windows\svcr.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2948
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
                PID:2736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2c26d5fb0d3506f5c0f94a4ec7f9c56e

      SHA1

      647f8841852978e02d23a9fce2da7ec2dda355b6

      SHA256

      da69d1dfdb4f99099fd4f2eff2e54c11e9300e70d6c977cdd2bc79dc09b65309

      SHA512

      5c1fd76018d1dc6f182849aa5b293a6041d867ad8dff9a131c84f42133e3224d1a9ca9bbf6e1174ba22241490ed0ea04839a71dabe4957a18b1354db1206dcf5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      96d423fbd9aa9ea48a534b33322a19d2

      SHA1

      8ab56584f2dd67b3e43e41410a3a45f1c6519cb4

      SHA256

      1473655275997c4e4908495eafcf84582c28c5b690b32d4ef3a50d09e5f2875e

      SHA512

      713d177ea1df4949e4783ddc634f49b63d7c97dc4edc11950ca90d94319072833214d8452eb5a845911e4a7358959058aa42f5c1d4afe66b1323549d48eec1f7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d48e1c102225d61a2a497b5226f1cf1a

      SHA1

      9b8f5e67c3ec457f1d96ddc24b4e918bf0bd0f2d

      SHA256

      2ffb3a521072c0f98f2834d80e9957e10b55c5995e52002beb175e202730c2db

      SHA512

      764fb06ebd422a82adc50ce6a1a7b582f25f0b656b750fb291f532ac6ed7a44825c5eee3fa5666c04518659122faffaec5289fa943eb8a72b7e675464b228469

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fe2ffbce31641a7d8067561add056b95

      SHA1

      0cef5ea5b719ad1c0fa62c44c5bd698b48b8ffe8

      SHA256

      628126ddc90480dd3bda374b5978f3c78db7d96c26f71b8b063fad6e7a85c826

      SHA512

      55599aba68f76754fc9d028319652f29e77516faa99dfbd1b63d64c6504c2c81eb2528d72c13f364151d03b922970ba9f1ab20997089aa9b0f70a74575aa9fff

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1d187d7844c169cad7265689af1e554f

      SHA1

      f10005b7d9931d1424f096ab4db7682e28d71128

      SHA256

      280090b23c3c8edba8c1196e6019f15e182db88ac80eb02cc5fb79a093a553d8

      SHA512

      95c46c0973cf88bc9b239148df3ca78858506c7e95d4464780592dbbfce096fc7fafa7321de72b6ac2c1d8c0bdfaef42c9adbff47c2c7d2b9947dec074a9e856

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d9e528a12f2e1293a6223be579785be6

      SHA1

      b884703e3fc7df7ad286796c431355a0f6d2f903

      SHA256

      83fd237fe4bea4ee8d93220e345fc73fd413a91ef6651e63153c9fab27c4862f

      SHA512

      d3008adf7d7aadd102cf29cd0549adc15defb987e941e21bbcb9b646c514ea0a7d683c27f61f76ee6e0f2eb66fc65ab48803eac8f14252dbb2173db9e46bb6da

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      dcc8721ceb1b6a8739cb41ec6e0e47f4

      SHA1

      2f437a8cc204df39c805d1b2f4af11f265f1516f

      SHA256

      0a7fb1df6a8fb93ae77fd16cf1bc351a006f1bccccac2dfb95d4442be264948c

      SHA512

      b18da803c77181a5cca33a5c0323a8456056535985de37997fdb9706c67b6f077385c83c69dfd91ffe7cb4d3eab6612ae2b95e73059c6b00d3d40ad7cab498c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      79d59494ae1b2ccce7387f87ac475ec3

      SHA1

      d06c0e028c71c2b828308f7af02fb3ba5ffda4f7

      SHA256

      7e0f13ee05df06fc2ea75407d1a16cfc3e513d67b48b24f15b97c7477a9fe8ae

      SHA512

      594ceae37660ce2d1b7526fc19ac230aebc3d17c814a6d125039ef095103e7ecfeab0e2b6eca3ae969b4d8f96ca9fd6171dfb6c5c4947f8ad326ad7b5c0adfc1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f1d67c010c1da0d91e6e2beef008353b

      SHA1

      cd2dc59f644aa4384edd41f733df0f95cd68324d

      SHA256

      74e9ca4331ece125f4f9897b72de4ddc6f08e37515589aec27b633e604106af4

      SHA512

      2e876a3ec3b3350d41f8af95c92c669ac86faa6490844b36c29ef8957fd23bf30176cd05909ffd4fdc82bb66550a3401290ef4e8aa6b74ef87b81e27f463fb71

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ea1c286efa00dfbebaf207504fbe0fba

      SHA1

      21508c46f3c9e0741251e0a12611f3ccd5dc6db8

      SHA256

      04b15e95a2ddc81a2d9722d33e2577f87d473341ae1dc583fa29f55801129c71

      SHA512

      92adf1ac00c9718571bfabab3308efa7971d85fcda57bb20451be38bc27a750ff8771c4675a645b2024ab9a38422c4acd0d72a2d18eea26fdd79a53c9ff1034e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d2c068d3da1930bfaf2b58a2e06af0af

      SHA1

      ff52cce8219d386051943ccdb8240483184baedc

      SHA256

      b6142354de77d2d9113b9f4eee992da54db763cb12d4a3934c5abe2e253e28b8

      SHA512

      d79c3d927b6c6d7e6af52c6aff8af5a5cc873c40ff8984760a27aa98b58590db2ec7e782f3740571581ac90e8abc4afaad6eaf815bf0cabd2765c309607dfba1

    • C:\Users\Admin\AppData\Local\Temp\Cab2197.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar2246.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Windows\svcr.exe

      Filesize

      556KB

      MD5

      9862c8d1ed05b1f41aa58ffcd621c0c7

      SHA1

      b367426011a95facc927718018b7b214a40af948

      SHA256

      d000d9b44f81d02f49b76aea429c502c770834a29d9b2794e8d109e3b572f118

      SHA512

      5c07982b036fe7f1257d3c3a7d49556d69dd32abb04b4f6821a2156670122bf2f9a8a2234d0f48541eb358d94fecab2e91d859675de25638dd0813c90458d37f

    • memory/2320-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2320-18-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-4-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-6-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-30-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-21-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-20-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-8-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-2-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-14-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-12-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2320-10-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2948-64-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2948-55-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2948-57-0x0000000010410000-0x000000001042E000-memory.dmp

      Filesize

      120KB