Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1482s
  • max time network
    1497s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/03/2024, 13:56

General

  • Target

    PowerISO8.exe

  • Size

    4.8MB

  • MD5

    e266c762c389d911887606e3d9be7b1c

  • SHA1

    f79243622e0abd9456e82030081bc158d2455f91

  • SHA256

    a636a22ba499261bf77b114676f49241f9c4532d586bb206db1cbddcb9c6bf8d

  • SHA512

    f7d2aa314d3aaf8ba0e8c7cae073e9b6900d05fb9ccafea267b7a21925605ac1f6abcf2aa7a29843ce56155400e97f24017b1a96c9a8e624522c094f0f6bd6c9

  • SSDEEP

    98304:jdFL7/mO2sh23D4oZZGAV6WIu8qQjFWgG11:X/tNpcR8zjFc11

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PowerISO8.exe
    "C:\Users\Admin\AppData\Local\Temp\PowerISO8.exe"
    1⤵
    • Loads dropped DLL
    • Checks for any installed AV software in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsz6B8D.tmp\System.dll

    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • C:\Users\Admin\AppData\Local\Temp\nsz6B8D.tmp\nsk6C69.tmp

    Filesize

    29KB

    MD5

    c3b224d15a9036805575b2ff0bcefeda

    SHA1

    74779ae82a97e97d770435d097821810f16c97c5

    SHA256

    23d8aeff49ffbac9f9490e9739e059cd7064516dbcd693fe2de77830b127ff8a

    SHA512

    5a5d98cc9a4aca076049340a4645879a8e4a1d2e24a672015627446d7e3729acf0b64bc8a0f702b8da735d22607fe13ba3ef6a497a57891804576899b06bb461

  • memory/3880-15-0x0000000003380000-0x0000000003390000-memory.dmp

    Filesize

    64KB

  • memory/3880-19-0x00000000031F0000-0x0000000003200000-memory.dmp

    Filesize

    64KB

  • memory/3880-20-0x0000000074590000-0x00000000745A0000-memory.dmp

    Filesize

    64KB

  • memory/3880-21-0x0000000073CE0000-0x0000000074491000-memory.dmp

    Filesize

    7.7MB

  • memory/3880-22-0x0000000005490000-0x0000000005A36000-memory.dmp

    Filesize

    5.6MB

  • memory/3880-23-0x0000000005A80000-0x0000000005B12000-memory.dmp

    Filesize

    584KB

  • memory/3880-24-0x0000000006600000-0x0000000006644000-memory.dmp

    Filesize

    272KB

  • memory/3880-25-0x0000000006650000-0x00000000066EC000-memory.dmp

    Filesize

    624KB

  • memory/3880-26-0x00000000066F0000-0x0000000006756000-memory.dmp

    Filesize

    408KB

  • memory/3880-27-0x0000000006C00000-0x000000000712C000-memory.dmp

    Filesize

    5.2MB

  • memory/3880-30-0x0000000003380000-0x0000000003390000-memory.dmp

    Filesize

    64KB

  • memory/3880-31-0x0000000073CE0000-0x0000000074491000-memory.dmp

    Filesize

    7.7MB