Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/02/2024, 15:22

240217-ssaymsgb5v 10

17/02/2024, 08:25

240217-kbabsacg8w 4

Analysis

  • max time kernel
    142s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17/02/2024, 08:25

General

  • Target

    SecuriteInfo.com.Adware.Downware.20091.25676.15900.exe

  • Size

    1.7MB

  • MD5

    68a70ef9d99e94926e7231e00e136890

  • SHA1

    5486bb9e8ad619d60e627efb13b1eb474a47c94f

  • SHA256

    f72ee83436cb1f82366bfaafb14a4c0cb99826c02166fc0bd21fb6e7eb5190c6

  • SHA512

    f5b55a4b05ce5598b2997625a659c24ba9b3f6f6bf27da02b2dab07384e062761de906b3c41abb77dd60cfe8dcd6b680ae3595249b046d713ae671b3edabff7c

  • SSDEEP

    24576:O7FUDowAyrTVE3U5FFdj79NTMazaDNfBFLDnDoxJlPWZ67Po6EFd1it8OgqL7X:OBuZrEUz9NwazalBVsPWU7Po6Z8/qL

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Downware.20091.25676.15900.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Downware.20091.25676.15900.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Users\Admin\AppData\Local\Temp\is-PK9GO.tmp\SecuriteInfo.com.Adware.Downware.20091.25676.15900.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-PK9GO.tmp\SecuriteInfo.com.Adware.Downware.20091.25676.15900.tmp" /SL5="$50150,875149,815616,C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Adware.Downware.20091.25676.15900.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7e3d634d058ae97d9767f68165581bcb

    SHA1

    fe7cca2e967caa433938a414fbed9fd53559727f

    SHA256

    17688e26abad5442d2243825943a0e59afced0f444d5da08d066063dee75fbde

    SHA512

    cef38573fdb1849eafc6338a36276b9d641419e8b962fbb6aad030fcf07b364211dde98db8eb5cd391487b1d829cb9b314c938b151fc8624bf694c92501784bb

  • C:\Users\Admin\AppData\Local\Temp\Cab3999.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar39DA.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\is-E8JNI.tmp\Logo.png

    Filesize

    7KB

    MD5

    5424804c80db74e1304535141a5392c6

    SHA1

    6d749f3b59672b0c243690811ec3240ff2eced8e

    SHA256

    9b7e2ea77e518b50e5dd78e0faec509e791949a7c7f360a967c9ee204a8f1412

    SHA512

    6c7364b9693ce9cbbdbca60ecef3911dfe3d2d836252d7650d34506d2aa41fc5892028ba93f2619caf7edb06576fddae7e5f91f5844b5c3a47f54ca39f84cc6e

  • C:\Users\Admin\AppData\Local\Temp\is-E8JNI.tmp\uTorrent.png

    Filesize

    9KB

    MD5

    cd3f5b72f3ecc90e946a38e3822b1d99

    SHA1

    901af8f4017dc55438b7fca85049039a8aefc136

    SHA256

    f3eca5d467e45c741e9a072aff31bba4db5e91713631dbc4b735a6032fef43e7

    SHA512

    ca61fca0b5dafd6fbd8f36fb1e524907bc29350226a7f2e4a22f0f563eb2e8c9cd90fe5e413df379d0aa2fd3a0817ade7bba03a2a07a2559ace9404d31275889

  • C:\Users\Admin\AppData\Local\Temp\is-PK9GO.tmp\SecuriteInfo.com.Adware.Downware.20091.25676.15900.tmp

    Filesize

    3.0MB

    MD5

    ea05563cc277258f747f1de0f7a7a740

    SHA1

    1e01ba7aa914ff64b3d860ecc7b98c1f575f5f2b

    SHA256

    e1f87b525e1381dbbdda258581d078664acf90de2211df88e543233112be900a

    SHA512

    7c9baa27e48088183e55352444e41e388dfc74751c1790c0bcaf2e97c9a5ad37c95265061bd6922d9ca1d26390c76e0688d4281b90465ec485a8e42da0f2dbbb

  • \Users\Admin\AppData\Local\Temp\is-E8JNI.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • \Users\Admin\AppData\Local\Temp\is-PK9GO.tmp\SecuriteInfo.com.Adware.Downware.20091.25676.15900.tmp

    Filesize

    578KB

    MD5

    a5f47b8b9fbd54ec860f57e46c5edf9c

    SHA1

    8a5d313504b31433c1ad5b8090adf1846321c7fb

    SHA256

    261dbf0aa0614522dcf5cb6fd472a7624db728a7e99515afaeea71697e480678

    SHA512

    985e03cc947a2d8a97768ecc5e6630432190c97798fed78fea197a57db7a1b54372de68785ea170e8e2f482776034f6385bc85ecc56123a3d1914cf9b9eac595

  • memory/816-0-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/816-136-0x0000000000400000-0x00000000004D4000-memory.dmp

    Filesize

    848KB

  • memory/2016-7-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2016-126-0x0000000003900000-0x000000000390F000-memory.dmp

    Filesize

    60KB

  • memory/2016-137-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2016-138-0x0000000003900000-0x000000000390F000-memory.dmp

    Filesize

    60KB

  • memory/2016-142-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB