Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    04/03/2024, 13:56

General

  • Target

    b24bc3cc5f6728b3b6bfb9046b29bbc0.exe

  • Size

    187KB

  • MD5

    b24bc3cc5f6728b3b6bfb9046b29bbc0

  • SHA1

    fe98a682de25f40f503bb92cf876da7ca3dad2e8

  • SHA256

    cf4b8fc8fc92c23553fe0179cdb1e0af748a1d4edd044ef5bdd9e7815aeaa94b

  • SHA512

    3a767bc2231730e8e5e5cb34a521b3848d4dfce4194e112bf091a9deb818730b69f3f65afb5bdbc3483734933205fc5211abb8886eef6291a8d45eec9bfcdb39

  • SSDEEP

    3072:mu8zBoOjWRUfy/IDEzg7/lthwM0cGkjvc4USEtJ4g25bICav1y55LUOL:781rBfPj79vRTiJ4dwMHLZ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1180
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1208
          • C:\Users\Admin\AppData\Local\Temp\b24bc3cc5f6728b3b6bfb9046b29bbc0.exe
            "C:\Users\Admin\AppData\Local\Temp\b24bc3cc5f6728b3b6bfb9046b29bbc0.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2320
            • C:\Users\Admin\AppData\Roaming\Orb\migynie.exe
              "C:\Users\Admin\AppData\Roaming\Orb\migynie.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2528
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp3ff78c9e.bat"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:900
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 112
                4⤵
                • Program crash
                PID:1360
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1788
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:2200
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:356
            • C:\Windows\system32\conhost.exe
              \??\C:\Windows\system32\conhost.exe "844081993-6081219631111584295-7559794819973773571618947064-2044498055-157138060"
              1⤵
                PID:1756
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:960

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                  Filesize

                  2.0MB

                  MD5

                  e1414efcedc040cf4871696efc793eb3

                  SHA1

                  69e0a993b3eaa8c2eaa56bb0d10584b45836da67

                  SHA256

                  cc79a6928501195301641617dd1e7c70d8302fe2e87be54168df65e89f43438e

                  SHA512

                  43fffae49681a36f42fc57a825789fed16e82657d3da30804d9a3096c86c7181e43548fe3e7bdccf9f33b5113ca8382e22bb0c4551e0b8a0030e6cfa46bc8ec3

                • C:\Users\Admin\AppData\Roaming\Mosiu\unalxya.irv

                  Filesize

                  366B

                  MD5

                  e846373efe8c1bd2cd50b8d04f1dd6de

                  SHA1

                  03b2b04851b950a3fc4242e2bfcf142e63e94252

                  SHA256

                  ba4f84d04e3abc01c8941343acdd7bfcf5e95f68e92ee866076251f0f2559065

                  SHA512

                  49deb6921f2d5854b787ada4b1ffd19fc325cfc7c57478f254701e17e8f25624fd6c2fc85b3cfd0e7a8585e218fcc8013b0d060594e6cd1bf28484ca897f53b7

                • \Users\Admin\AppData\Roaming\Orb\migynie.exe

                  Filesize

                  187KB

                  MD5

                  3756e9988be9e35f3c32a568b7160f69

                  SHA1

                  1150543b7aac6ddf98e842ce00ae799ea5fa35f4

                  SHA256

                  1b4610a3fe981be58a177dd11e6850e69dd7015e6619a36de9a9d50fd3c73f40

                  SHA512

                  7b12b536b150f53903cda5256a762b5c0fc8ea674a9406c2ee0863ffb975ebe0b6d42eb2060f23252407a4c73655a54ffd5ad7a901d1599a6875dd54490adf4b

                • memory/1120-17-0x0000000002220000-0x0000000002247000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-18-0x0000000002220000-0x0000000002247000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-19-0x0000000002220000-0x0000000002247000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-20-0x0000000002220000-0x0000000002247000-memory.dmp

                  Filesize

                  156KB

                • memory/1120-21-0x0000000002220000-0x0000000002247000-memory.dmp

                  Filesize

                  156KB

                • memory/1180-23-0x0000000000130000-0x0000000000157000-memory.dmp

                  Filesize

                  156KB

                • memory/1180-24-0x0000000000130000-0x0000000000157000-memory.dmp

                  Filesize

                  156KB

                • memory/1180-25-0x0000000000130000-0x0000000000157000-memory.dmp

                  Filesize

                  156KB

                • memory/1180-26-0x0000000000130000-0x0000000000157000-memory.dmp

                  Filesize

                  156KB

                • memory/1208-28-0x0000000002620000-0x0000000002647000-memory.dmp

                  Filesize

                  156KB

                • memory/1208-29-0x0000000002620000-0x0000000002647000-memory.dmp

                  Filesize

                  156KB

                • memory/1208-30-0x0000000002620000-0x0000000002647000-memory.dmp

                  Filesize

                  156KB

                • memory/1208-31-0x0000000002620000-0x0000000002647000-memory.dmp

                  Filesize

                  156KB

                • memory/1360-322-0x00000000770E0000-0x00000000770E1000-memory.dmp

                  Filesize

                  4KB

                • memory/1360-252-0x0000000000670000-0x0000000000697000-memory.dmp

                  Filesize

                  156KB

                • memory/1360-355-0x0000000000610000-0x0000000000611000-memory.dmp

                  Filesize

                  4KB

                • memory/1360-358-0x0000000000670000-0x0000000000697000-memory.dmp

                  Filesize

                  156KB

                • memory/1788-33-0x0000000000180000-0x00000000001A7000-memory.dmp

                  Filesize

                  156KB

                • memory/1788-34-0x0000000000180000-0x00000000001A7000-memory.dmp

                  Filesize

                  156KB

                • memory/1788-35-0x0000000000180000-0x00000000001A7000-memory.dmp

                  Filesize

                  156KB

                • memory/1788-36-0x0000000000180000-0x00000000001A7000-memory.dmp

                  Filesize

                  156KB

                • memory/2320-43-0x0000000000480000-0x00000000004A7000-memory.dmp

                  Filesize

                  156KB

                • memory/2320-68-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-41-0x0000000000480000-0x00000000004A7000-memory.dmp

                  Filesize

                  156KB

                • memory/2320-42-0x0000000000480000-0x00000000004A7000-memory.dmp

                  Filesize

                  156KB

                • memory/2320-39-0x0000000000480000-0x00000000004A7000-memory.dmp

                  Filesize

                  156KB

                • memory/2320-44-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-46-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-48-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-50-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-52-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-54-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-56-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-58-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-60-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-62-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-64-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-66-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-40-0x0000000000480000-0x00000000004A7000-memory.dmp

                  Filesize

                  156KB

                • memory/2320-70-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-72-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-74-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-76-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-78-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-107-0x00000000770E0000-0x00000000770E1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-134-0x00000000003F0000-0x00000000003F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2320-38-0x0000000000480000-0x00000000004A7000-memory.dmp

                  Filesize

                  156KB

                • memory/2320-14-0x0000000000480000-0x00000000004BE000-memory.dmp

                  Filesize

                  248KB

                • memory/2320-225-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2320-226-0x0000000000480000-0x00000000004A7000-memory.dmp

                  Filesize

                  156KB

                • memory/2320-0-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2320-1-0x00000000001B0000-0x00000000001C5000-memory.dmp

                  Filesize

                  84KB

                • memory/2320-11-0x0000000000480000-0x00000000004BE000-memory.dmp

                  Filesize

                  248KB

                • memory/2320-2-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2528-230-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB

                • memory/2528-13-0x0000000000400000-0x000000000043E000-memory.dmp

                  Filesize

                  248KB