Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 12:49

General

  • Target

    abeaeb8dd0cd8943eb01e47d308ebf06.exe

  • Size

    125KB

  • MD5

    abeaeb8dd0cd8943eb01e47d308ebf06

  • SHA1

    26f5ade461be02177a07a2a77541a978e1288ade

  • SHA256

    e408f2940a747f830680a12bab0a22470c6b315c7acbcb190613b7b58dbda61c

  • SHA512

    9f6aaf0113456bee6651907e8216c03e0bc80d882ab40645021a907809c2f06b17c2096c5f6dec9bd991e2ae91c41df7d8b0ce7ef69b41d5fa9e3c045c0e6978

  • SSDEEP

    3072:AqBFJLzgOJJPolDa08S8OwsxLZ4LaXUiYPAsobPpKY00X/6u0Nv8:XPdZMl3d8OJLZb9sobMuSv8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 21 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies File Icons 2 IoCs
  • Modifies Shortcut Icons 2 IoCs

    Modifies/removes arrow indicator from shortcut icons.

  • Modifies registry class 51 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abeaeb8dd0cd8943eb01e47d308ebf06.exe
    "C:\Users\Admin\AppData\Local\Temp\abeaeb8dd0cd8943eb01e47d308ebf06.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies File Icons
    • Modifies Shortcut Icons
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\WScript.exe
      "WScript.exe" "C:\Program Files (x86)\WinRAR\WinRAR.knl"
      2⤵
        PID:4824
      • C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe
        "C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4216
      • C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe
        C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe "C:\Users\Public\Desktop\Internet Explerer" /P "Admin":F /y
        2⤵
        • Executes dropped EXE
        PID:4348
      • C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe
        C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Æô¶¯ Internet Explerer ä¯ÀÀÆ÷.lnk" /P "Admin":F /y
        2⤵
        • Executes dropped EXE
        PID:1200
      • C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe
        C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe "C:\Users\Public\Desktop" /P "Admin":R /y
        2⤵
        • Executes dropped EXE
        PID:2264
      • C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe
        C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe "C:\Users\Public\Desktop" /E /G "Admin":W /y
        2⤵
        • Executes dropped EXE
        PID:3776
      • C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe
        C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe "C:\Users\Public\Desktop" /E /G "Admin":C /y
        2⤵
        • Executes dropped EXE
        PID:4188
      • C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe
        C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe "C:\Users\Public\Desktop\Internet Explerer.lnk" /d "Admin" /y
        2⤵
        • Executes dropped EXE
        PID:1584
      • C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe
        C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe "C:\Users\Public\Desktop\Internet Explerer.lnk" /E /G "Admin":R /y
        2⤵
        • Executes dropped EXE
        PID:636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CBCD8604.exe

      Filesize

      44KB

      MD5

      78fd41a1e1d2cf1c7657cf80bdde1164

      SHA1

      acb97223f909ab20dd0b0e655a8869e78b056d2b

      SHA256

      01259b3cd50d39ca21b03af4e22a7bca2b91cf11ab4ce78661c646f08f6bce00

      SHA512

      317e4013bdd70cd50d28961581fe7b774116ea83083718c9db921a86adab5c8d2d3a5cdedd9d172ba65b7a3c7b0699aa8546061b995d3f62e10062f568b78077

    • C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe

      Filesize

      65KB

      MD5

      b904cf041cacaae74655cf009acfed2e

      SHA1

      028ef889562a55bc98119fe2c186efb35f556bd1

      SHA256

      72f4498744d1c856eb35028fc0fa59bf0a78b0fa833c49ead54115f08c2f3846

      SHA512

      4ebf41f49fdcb1b70c6b88351c85dff98eb2f75787e36b8741e922363ec8134399450351c431cefed42d1757163eb6196275d2c6509a9c4826bcc4961d726d4c

    • C:\Users\Admin\AppData\Local\Temp\nsc4DB3.tmp\System.dll

      Filesize

      11KB

      MD5

      00a0194c20ee912257df53bfe258ee4a

      SHA1

      d7b4e319bc5119024690dc8230b9cc919b1b86b2

      SHA256

      dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

      SHA512

      3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

    • C:\Users\Admin\AppData\Local\Temp\nsc4DB3.tmp\inetc.dll

      Filesize

      20KB

      MD5

      8d8fdad7e153d6b82913f6fdc407d12c

      SHA1

      aabbeed33cd5221e4cb22aab6e48310df94facfd

      SHA256

      e727c8bba6686c4814602f2bc089af4b4cf3498d1dbe1a08d8c4732da5ba046b

      SHA512

      42bc0ce1aca63904c34025307fd4b1d9f480ae47e42e7dfa48bbbf8286d947de2989435ad7a748951291307949217afeebcd31d10a1356c9366d3187085773a2

    • C:\Users\Admin\AppData\Local\Temp\nsc4DB3.tmp\md5dll.dll

      Filesize

      8KB

      MD5

      a7d710e78711d5ab90e4792763241754

      SHA1

      f31cecd926c5d497aba163a17b75975ec34beb13

      SHA256

      9b05dd603f13c196f3f21c43f48834208fed2294f7090fcd1334931014611fb2

      SHA512

      f0ca2d6f9a8aeac84ef8b051154a041adffc46e3e9aced142e9c7bf5f7272b047e1db421d38cb2d9182d7442bee3dd806618b019ec042a23ae0e71671d2943c0

    • C:\Users\Admin\AppData\Local\Temp\nsc4DB3.tmp\nsExec.dll

      Filesize

      6KB

      MD5

      e54eb27fb5048964e8d1ec7a1f72334b

      SHA1

      2b76d7aedafd724de96532b00fbc6c7c370e4609

      SHA256

      ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824

      SHA512

      c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4

    • C:\Users\Admin\AppData\Local\Temp\nso68DE.tmp\InetLoad2.dll

      Filesize

      21KB

      MD5

      33322da8b36ea8b67448ec34c827a319

      SHA1

      45cae4b64ecc9bb5d3f1e01faaa14e067e74828d

      SHA256

      fcc886a8ef7575e292ef6210902581273e33047da2f3f6e0092b7887a212c2f0

      SHA512

      e97a4b427e89832c6555ac64044b5b3745164482afd3ff7c4b17005c99f245cc7c7e97653abad345810caca3f472c43f51036157f32926ea81306c939e9e1c3c

    • C:\Users\Public\Desktop\Internet Explerer.lnk

      Filesize

      1KB

      MD5

      e604e32a7cc784a849e0b23ce9a875a4

      SHA1

      4b010c162e26b51cf3d0bef6cff0fa1bd4dd7ff0

      SHA256

      79ac9be7021cb1e7e5541aa2172d1a11d3422b994dd90a28ddeaed2309a5f922

      SHA512

      cb90f0e8983f04c1c8c15b6945a88b333308813337700bb23a325e25c67f020a414ae08f7ce853327a83bed3906097e0fd10d42de07c5fde0ffe13c92431013a