Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 03:21

General

  • Target

    b6618445dfeaa1bf57c1d61d4cdf98bc.exe

  • Size

    712KB

  • MD5

    b6618445dfeaa1bf57c1d61d4cdf98bc

  • SHA1

    f24408a4405efd6c0d8046b7fa67b0069d2709b5

  • SHA256

    bd2fc42023cb245d21498c5a80d777ff70ff7999a2d161e16b2e449038432ad8

  • SHA512

    dee741d884297aca174d66ca96c371098132bb324d5040e74be963146f5105c6f34e64ebcaa9c733ead96e78c628ffaebc9f66e257fbd10e8e630bb6a08db94f

  • SSDEEP

    12288:oT32nRMfInKh5UaEBTEdcuKBV72Mq7qh0r2zBJkTw1c2obY7qvgjRt1l0g:832n3C5hqwdpKB12Mq7pKV/ocXx0g

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6618445dfeaa1bf57c1d61d4cdf98bc.exe
    "C:\Users\Admin\AppData\Local\Temp\b6618445dfeaa1bf57c1d61d4cdf98bc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\89.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\89.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\uninstal.bat
        3⤵
          PID:2416
    • C:\Windows\Hacker.com.cn.ini
      C:\Windows\Hacker.com.cn.ini
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        2⤵
          PID:2948

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\uninstal.bat

        Filesize

        152B

        MD5

        c799b445928854e743af7cbcffcb51b6

        SHA1

        b46bc3d275c31a7d2f34a8f5b1053c616f588f7c

        SHA256

        dfd028445207bba1f2d410c6d6512c8825708762a4f610d4fa504549f5b6a96f

        SHA512

        3021d2ba62b2d8d14a1be2c469e7ff844ea4abb23770ddb15c59dfefab230ab147e2573a5d99c1f62207e20f03267ce953788ad7651706e5d134dcd7edbc4905

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\89.exe

        Filesize

        411KB

        MD5

        92f456b56baf54f813543981847aca06

        SHA1

        62d44ecbb19bd9116fba4d44d1ed9fa4c1c10c03

        SHA256

        75c6a684d53d25ef57ce983d337baf61a7218bfe02a61fb37473d3940dd9b7a9

        SHA512

        fd922413e6aa263babe6ebc33c7f3cd6046cbd5fca3f14eaff71f7d4fa4a5dd272972510d624c34cbf7f355e101eb7988c74941efd1158920ae921b86c127855

      • memory/1784-32-0x0000000001000000-0x00000000010BE000-memory.dmp

        Filesize

        760KB

      • memory/1784-1-0x00000000003E0000-0x0000000000430000-memory.dmp

        Filesize

        320KB

      • memory/1784-2-0x0000000001000000-0x00000000010BE000-memory.dmp

        Filesize

        760KB

      • memory/1784-12-0x0000000002F00000-0x0000000002FCC000-memory.dmp

        Filesize

        816KB

      • memory/1784-3-0x0000000002B10000-0x0000000002B13000-memory.dmp

        Filesize

        12KB

      • memory/1784-33-0x00000000003E0000-0x0000000000430000-memory.dmp

        Filesize

        320KB

      • memory/1784-0-0x0000000001000000-0x00000000010BE000-memory.dmp

        Filesize

        760KB

      • memory/2000-16-0x0000000000A60000-0x0000000000B2C000-memory.dmp

        Filesize

        816KB

      • memory/2000-31-0x0000000000400000-0x00000000004CC000-memory.dmp

        Filesize

        816KB

      • memory/2000-17-0x0000000000400000-0x00000000004CC000-memory.dmp

        Filesize

        816KB

      • memory/2556-23-0x00000000001D0000-0x00000000001D1000-memory.dmp

        Filesize

        4KB

      • memory/2556-21-0x0000000000400000-0x00000000004CC000-memory.dmp

        Filesize

        816KB

      • memory/2556-35-0x0000000000400000-0x00000000004CC000-memory.dmp

        Filesize

        816KB

      • memory/2556-37-0x00000000001D0000-0x00000000001D1000-memory.dmp

        Filesize

        4KB

      • memory/2556-40-0x0000000000400000-0x00000000004CC000-memory.dmp

        Filesize

        816KB