Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 18:09 UTC

General

  • Target

    203c7abaeb5e19ae18108eff1255097fba191d102d2b778a3be86a035ec2323f.exe

  • Size

    893KB

  • MD5

    84d1d57006cc9825c85ca6ab1aed9109

  • SHA1

    be5624a12e00bda837f4f9b661c54895098eaf42

  • SHA256

    203c7abaeb5e19ae18108eff1255097fba191d102d2b778a3be86a035ec2323f

  • SHA512

    cb5cb38de8867481143d86f152a65eb84e6752c4fd301e631520e524c16ebfa0fb21bea9fac2d7eca967c7f07b5c426a13355d77b40351f9cbc9832669d2c529

  • SSDEEP

    12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEs1HzCHT4TlM9YmJ2Q97v54yC6/6:zQ5aILMCfmAUjzX6T0TlOnvPw

Malware Config

Signatures

  • KPOT

    KPOT is an information stealer that steals user data and account credentials.

  • KPOT Core Executable 1 IoCs
  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 10 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\203c7abaeb5e19ae18108eff1255097fba191d102d2b778a3be86a035ec2323f.exe
    "C:\Users\Admin\AppData\Local\Temp\203c7abaeb5e19ae18108eff1255097fba191d102d2b778a3be86a035ec2323f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\SysWOW64\cmd.exe
      /c sc stop WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Windows\SysWOW64\sc.exe
        sc stop WinDefend
        3⤵
        • Launches sc.exe
        PID:2296
    • C:\Windows\SysWOW64\cmd.exe
      /c sc delete WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\SysWOW64\sc.exe
        sc delete WinDefend
        3⤵
        • Launches sc.exe
        PID:2428
    • C:\Windows\SysWOW64\cmd.exe
      /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Set-MpPreference -DisableRealtimeMonitoring $true
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2868
    • C:\Users\Admin\AppData\Roaming\WinSocket\203c8abaeb6e19ae19109eff1266098fba191d102d2b889a3be97a036ec2323f.exe
      C:\Users\Admin\AppData\Roaming\WinSocket\203c8abaeb6e19ae19109eff1266098fba191d102d2b889a3be97a036ec2323f.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:2432
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {74547B9B-9190-499B-90E5-AA489BFF965C} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Roaming\WinSocket\203c8abaeb6e19ae19109eff1266098fba191d102d2b889a3be97a036ec2323f.exe
        C:\Users\Admin\AppData\Roaming\WinSocket\203c8abaeb6e19ae19109eff1266098fba191d102d2b889a3be97a036ec2323f.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1528
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe
          3⤵
            PID:3068
        • C:\Users\Admin\AppData\Roaming\WinSocket\203c8abaeb6e19ae19109eff1266098fba191d102d2b889a3be97a036ec2323f.exe
          C:\Users\Admin\AppData\Roaming\WinSocket\203c8abaeb6e19ae19109eff1266098fba191d102d2b889a3be97a036ec2323f.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2016
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe
            3⤵
              PID:2912

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\WinSocket\203c8abaeb6e19ae19109eff1266098fba191d102d2b889a3be97a036ec2323f.exe

          Filesize

          893KB

          MD5

          84d1d57006cc9825c85ca6ab1aed9109

          SHA1

          be5624a12e00bda837f4f9b661c54895098eaf42

          SHA256

          203c7abaeb5e19ae18108eff1255097fba191d102d2b778a3be86a035ec2323f

          SHA512

          cb5cb38de8867481143d86f152a65eb84e6752c4fd301e631520e524c16ebfa0fb21bea9fac2d7eca967c7f07b5c426a13355d77b40351f9cbc9832669d2c529

        • memory/1528-81-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-74-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-73-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-75-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-82-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-77-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-76-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-101-0x00000000003B0000-0x00000000003D9000-memory.dmp

          Filesize

          164KB

        • memory/1528-95-0x00000000004A0000-0x00000000004A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-89-0x00000000003B0000-0x00000000003D9000-memory.dmp

          Filesize

          164KB

        • memory/1528-88-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-87-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/1528-79-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-84-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-78-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-80-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/1528-83-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/2016-134-0x0000000000260000-0x0000000000289000-memory.dmp

          Filesize

          164KB

        • memory/2016-133-0x0000000000A00000-0x0000000000A01000-memory.dmp

          Filesize

          4KB

        • memory/2016-106-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2016-107-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2016-120-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/2016-121-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/2016-122-0x0000000000260000-0x0000000000289000-memory.dmp

          Filesize

          164KB

        • memory/2432-55-0x0000000010000000-0x000000001001E000-memory.dmp

          Filesize

          120KB

        • memory/2432-62-0x0000000000060000-0x0000000000061000-memory.dmp

          Filesize

          4KB

        • memory/2652-49-0x0000000000390000-0x00000000003B9000-memory.dmp

          Filesize

          164KB

        • memory/2652-33-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-37-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-43-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-46-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/2652-36-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-50-0x0000000010000000-0x0000000010007000-memory.dmp

          Filesize

          28KB

        • memory/2652-47-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-42-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-60-0x0000000001D30000-0x0000000001D31000-memory.dmp

          Filesize

          4KB

        • memory/2652-41-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-35-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-64-0x0000000000390000-0x00000000003B9000-memory.dmp

          Filesize

          164KB

        • memory/2652-34-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-40-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-32-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-38-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2652-39-0x00000000002F0000-0x00000000002F1000-memory.dmp

          Filesize

          4KB

        • memory/2868-67-0x0000000073A20000-0x0000000073FCB000-memory.dmp

          Filesize

          5.7MB

        • memory/2868-66-0x0000000002E50000-0x0000000002E90000-memory.dmp

          Filesize

          256KB

        • memory/2868-65-0x0000000073A20000-0x0000000073FCB000-memory.dmp

          Filesize

          5.7MB

        • memory/2868-63-0x0000000002E50000-0x0000000002E90000-memory.dmp

          Filesize

          256KB

        • memory/2924-14-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-11-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-19-0x0000000000610000-0x0000000000639000-memory.dmp

          Filesize

          164KB

        • memory/2924-18-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-17-0x0000000000400000-0x0000000000472000-memory.dmp

          Filesize

          456KB

        • memory/2924-15-0x0000000000610000-0x0000000000639000-memory.dmp

          Filesize

          164KB

        • memory/2924-2-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-13-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-12-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-28-0x0000000000610000-0x0000000000639000-memory.dmp

          Filesize

          164KB

        • memory/2924-10-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-9-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-8-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-7-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-6-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-5-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-4-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        • memory/2924-3-0x0000000000360000-0x0000000000361000-memory.dmp

          Filesize

          4KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.