Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 13:30

General

  • Target

    b4d051eb4e505340638048ae8ada9899.exe

  • Size

    3.1MB

  • MD5

    b4d051eb4e505340638048ae8ada9899

  • SHA1

    fadd88fad71647894d3aa76010c6606a60388f23

  • SHA256

    d03ba24ab70fa01053ef1b27420a0585540d371702c06332bfa1c7fb8999574d

  • SHA512

    cdd13f5b6fe6193effa755115685b0df1e2c2003d781e05a93a5b05750a9818a3ff00763fe25e52f8bf60e4006718dc80f203e0705772c6df56e4443762dc8d9

  • SSDEEP

    49152:qitOd4k7ydepSSPIZDscC+QZKDVdfu31r:qiK4IIZYfZKDVQFr

Score
10/10

Malware Config

Signatures

  • Blocklisted process makes network request 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4d051eb4e505340638048ae8ada9899.exe
    "C:\Users\Admin\AppData\Local\Temp\b4d051eb4e505340638048ae8ada9899.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\system32\notepad.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2424
        • C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe
          "C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"
          4⤵
          • Executes dropped EXE
          PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\x64btit.txt

    Filesize

    28B

    MD5

    c697f1a27a61ebf609bff2677025dc6e

    SHA1

    7acb4240d77cdfdcc26acc64060afed469bcfad4

    SHA256

    2dc29bee0f66ae4463248cb6619b069a3d40c1bef83d1c6139ec11f9b6bd26a6

    SHA512

    58a9148b824fc99b381eda53849e4f523466e53c1898a867847e2aa62d1ecf46fff35b37e36608a18f3ad8a2382ceac2aa821bcd7955b46e4333c10dda6e1751

  • \Users\Admin\AppData\Local\Temp\GetX64BTIT.exe

    Filesize

    3KB

    MD5

    b4cd27f2b37665f51eb9fe685ec1d373

    SHA1

    7f08febf0fdb7fc9f8bf35a10fb11e7de431abe0

    SHA256

    91f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581

    SHA512

    e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e

  • memory/2424-23-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-42-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-45-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-43-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-24-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-41-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-40-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-11-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-12-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-13-0x0000000000090000-0x0000000000098000-memory.dmp

    Filesize

    32KB

  • memory/2424-14-0x0000000076D00000-0x0000000076EA9000-memory.dmp

    Filesize

    1.7MB

  • memory/2424-25-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-38-0x0000000000170000-0x000000000018F000-memory.dmp

    Filesize

    124KB

  • memory/2424-36-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/2424-28-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-26-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2424-27-0x0000000000400000-0x000000000049F000-memory.dmp

    Filesize

    636KB

  • memory/2504-1-0x00000000007D0000-0x00000000007DA000-memory.dmp

    Filesize

    40KB

  • memory/2504-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2504-3-0x0000000000400000-0x0000000000738000-memory.dmp

    Filesize

    3.2MB

  • memory/2504-6-0x00000000007D0000-0x00000000007DA000-memory.dmp

    Filesize

    40KB

  • memory/2504-4-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2828-19-0x00000000045E0000-0x0000000004664000-memory.dmp

    Filesize

    528KB

  • memory/2828-2-0x00000000000D0000-0x00000000000D2000-memory.dmp

    Filesize

    8KB

  • memory/2828-9-0x0000000076D00000-0x0000000076EA9000-memory.dmp

    Filesize

    1.7MB

  • memory/2828-8-0x00000000045E0000-0x0000000004664000-memory.dmp

    Filesize

    528KB

  • memory/2828-7-0x0000000000210000-0x0000000000218000-memory.dmp

    Filesize

    32KB