Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 18:06

General

  • Target

    02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe

  • Size

    866KB

  • MD5

    3fe23b6eea62a2dde12bdbf41f08a9f8

  • SHA1

    521e2a6fb7e951944d21c7124371e273f7399419

  • SHA256

    02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799

  • SHA512

    db59d8ec5ef85cff06c43a4897b348f8a5d3fdb6a25316162ae66eacdc6925b080e52645e2c9f959d3d2c7ebc3dfacd5552f74f2017036a4588004e7328d3e13

  • SSDEEP

    24576:RueYYFNwOx0CJ75WEcvLlhVN84RUAY4htSB:RuiXwS0s1WEUtJhq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe
    "C:\Users\Admin\AppData\Local\Temp\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\launch.exe
      C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\launch.exe "e02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe" "02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe" "1e2431c5aee742d78a1642fb5d7bfbc8" dec
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2472
    • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe
      C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe /path="C:\Users\Admin\AppData\Local\Temp\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\46DE64130271B61D13A0FAFD9465377C_D8840AF2A28227DC3600C6CA04024DE2

    Filesize

    2KB

    MD5

    08d8797375028c89b30522aaebc8fa6f

    SHA1

    d00d260556bf146c61d131cc821b338a3f1e0d4d

    SHA256

    26754ece97d78d790021621c4c6ff7a5f2bc60abdf96f46949c8a9ec64331616

    SHA512

    aa050752bc4f02b7ec7a065f72a223ecd1828b5f7d5942b4f5fbdebe38dc395c8695910c263e0c48dbc872e51949b85599cc574842292dbb6c692171f677a2b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BBB768C456D9E2DCD3EF595C400D483D_64C05B9EB32FC3D0CE6CB126561EEBFF

    Filesize

    1KB

    MD5

    4d4d4f0936c9b22c03799cfb07e17cf4

    SHA1

    98a2adaf3dd7b39417604c18ee72ef67c68db6b0

    SHA256

    a7ccc2a20d1728e18adfa0a93e8dfd7fe0e7a634890d3325ab2756a329981d80

    SHA512

    0f45f8f02895b8415b470a82cf0b1e1d14d96e6a19385e0ec4668aab9cb37303428768ba0dd5b0b711130a92c8da8165775bb1d124855f0470491691e083c7ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\46DE64130271B61D13A0FAFD9465377C_D8840AF2A28227DC3600C6CA04024DE2

    Filesize

    466B

    MD5

    73508ded599bf8cec130c03b3fa09aa3

    SHA1

    585ef7a598ecedf1ccf775ff27fcf5876db6c4d6

    SHA256

    14ea7796e475c90c8fca24337c949f8519f34f050e80667beddb4fbb6c340c39

    SHA512

    615e10775d9cf021056060a24f4c3c54eb6af33532b3ac8937386482054986de1ee02251a7059734d7716d3c57d07b74139213a8e25c435f14963e083e9e1b50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    516ad423f9b4b8389ce67dfdfd033761

    SHA1

    3143b477751d82e78fe0be1d6d9472a8df226bd3

    SHA256

    3d52c7b0257852205ebd102cdf89056c731a9cea043f58c2dc521a4dff35f151

    SHA512

    5f765c9332b3724ca55b34ed6835b27c657e71c8e704de5b509be26e83fb1b36fc884c1ffbcee917f6cad01b613b6e0bd95b96cd6f3ec85632dbf11dd1c31b70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BBB768C456D9E2DCD3EF595C400D483D_64C05B9EB32FC3D0CE6CB126561EEBFF

    Filesize

    444B

    MD5

    df95bb95cba4a81894b096266a370068

    SHA1

    9ff2c6edf78e540e54f0628d8440c16c81384565

    SHA256

    1c027e71c13cff8de8f8f4ff3890927e216e1023cc56d4b7332eee6a057ad97a

    SHA512

    8c3158418d77fc109cd0c7a9c1fd6959d88bdf2b52dc2c388c20457f6576a373e2e528322353d70b44a618bfdc00eed1be956fe4448e976d09ba266ee8d39a60

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe

    Filesize

    205KB

    MD5

    6d8849368956a8931ae0c5acf147fb90

    SHA1

    c87bf86433bcaf935cd43c55651f6c6b9dd3703b

    SHA256

    c6e3b8f881d95b0b77ebda59f4c3c0e2fa5c0ac93deeaf5e107696645c7ca9b4

    SHA512

    e42502713bd03a63297859ea3016c7344a5859d60ce6ad52cfcefd5671fc3fe73ec45b8f7e84fccf9b9041eb85fef2e19d82ce9480576920d0c787a9cb537f45

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe

    Filesize

    384KB

    MD5

    40a9984f28a963d3f45195ad849bcbd4

    SHA1

    800d769ecf5d385a43372a40a9d547992e27e849

    SHA256

    96275952405c971ccf9e67623ad894045e1fa8103ee3d8a3a313d5057059dd50

    SHA512

    61767b014653cf9cafee8112628a42f5119b76d79d2f482dae93cb95b01a1d43826ade32674058e38c28ff83973ffd8f424c6430ce8c4cb25878c4f4b62ddcfa

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe.config

    Filesize

    690B

    MD5

    bca0ea75b6940aa86960d7b9098a5998

    SHA1

    3d57f82158ac72c7eb2e72ba19a80485d8103130

    SHA256

    5a494295936d2170433864b449257bbac7b976413811a0b6339e37f83a891f8d

    SHA512

    260a05c509d874239a27798421ee75ac7e2bbc0d2a0485122740e8b8adcd8f43f98f7633cef278d9f7f4a132633b4b1cdf4b641e2233e891dce2d6eb6e75c3d3

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\e02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe

    Filesize

    267KB

    MD5

    ce43038a61464bc51ce9e9168229a2d0

    SHA1

    61ca2824a68e2afebb88a57547e4497bbd61764b

    SHA256

    d02c2ea570e98fa601d4f53e626a29e06995bfd4f87fe699e80ba8854dfe7eb8

    SHA512

    e81608b3573b9c842e603d203d1b7224834ed2f618138b2d5c00db4bb8cd39cb6c53e4e7d77a21b010b0c735c594b32b01b29cd0e26f776a9071858f3414dad6

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\installer.exe

    Filesize

    58KB

    MD5

    1a5f1cc52f39821f8f04638be2c88574

    SHA1

    e60559cfb6640ed85428f48d0345ead8197f4a87

    SHA256

    820f845108ad6e5fe46eb4196814331969b2066135cd04a5933c5ba8bae41d2b

    SHA512

    4ea026ff84bc936361313604cba09ab1e4faf4a596a2460d75e86743207349141dc8d54fdfde52603dcaaae5c50826ea488dac99e75553952db5499dbd2e1453

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\launch.exe

    Filesize

    21KB

    MD5

    9c36bdc7f14753aacc53660a270202e0

    SHA1

    bbb9d0665a4c501ed294cfb45d9769921f7116f4

    SHA256

    06cb83a06a9124fa85e13a6cc153b871ba2973c9c5535cff4e6e43bfa15ebe2d

    SHA512

    53a625877695ae48f31ba6f95425dbc8fe262305efb1506861e79de5c31a9734e4b07d010f3341c09862805d2af5de95c7466e605c7a2bf32413556f6fcf69e4

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\launch.exe

    Filesize

    26KB

    MD5

    1a333b5e9cf28be2febedfd805e2cf5c

    SHA1

    24c3a57cf6f2553d006a5e03155b056b71e96e0f

    SHA256

    da98a5ab1f2a1437791e5b3fe8eda52c8119ff852a76189fcfc2e8e2bb5b2ee2

    SHA512

    42b2ce79719f616dd5623e28fe8bef5318a0dce9b67537907f459e9d960921f0df12b3d253dd4366184b0b0cd686d72de6c3ecf52a133843a460a44bf0fdbe91

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\launch.exe.config

    Filesize

    359B

    MD5

    05a59e8e79546860cf1e351e32e69404

    SHA1

    aef4ad7bcbd79f99feb7100f05938721f12f7dce

    SHA256

    a368ee85ee624c5adaad674a9b5986f17de7020206e93755c0d086714fcc9430

    SHA512

    6ec6d988e5c4736ca56118926fef22f952991688bee8408b782273622f2a1f5d8c57850bdb1992f70c23df42366bec56527ad1395484aa5916d84e1249d159fa

  • C:\Users\Admin\AppData\Local\Temp\Tar24F5.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe

    Filesize

    324KB

    MD5

    61bfa6616d400575abd0a1d2f879d800

    SHA1

    4d83ce07490a22438ddf8d52e6885a210179e5e4

    SHA256

    a5a508fd5c969cc598df44a940371b607aa245e57d687eef25e3d9fd2c07a1e5

    SHA512

    45b8ae37dd4e981a121c57cb16b58cf356aeb867a8c40048e0274c458d496cb6514d4d97e39370ea0de3279c12c6a670b60a6b46c03e722d1fe312c4ea8eec64

  • \Users\Admin\AppData\Local\Temp\nsy21F4.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • memory/1040-5-0x0000000001F70000-0x0000000001F71000-memory.dmp

    Filesize

    4KB

  • memory/2472-18-0x0000000073C30000-0x00000000741DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2472-27-0x0000000073C30000-0x00000000741DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2472-19-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/2472-77-0x0000000073C30000-0x00000000741DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2656-102-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2656-101-0x0000000001FF0000-0x0000000002070000-memory.dmp

    Filesize

    512KB

  • memory/2656-99-0x0000000001FE0000-0x0000000001FEE000-memory.dmp

    Filesize

    56KB

  • memory/2656-100-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2656-105-0x0000000001FF0000-0x0000000002070000-memory.dmp

    Filesize

    512KB

  • memory/2656-106-0x0000000001FF0000-0x0000000002070000-memory.dmp

    Filesize

    512KB

  • memory/2656-104-0x0000000001FF0000-0x0000000002070000-memory.dmp

    Filesize

    512KB

  • memory/2656-103-0x0000000001FF0000-0x0000000002070000-memory.dmp

    Filesize

    512KB

  • memory/2656-110-0x0000000001FF0000-0x0000000002070000-memory.dmp

    Filesize

    512KB

  • memory/2656-116-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

    Filesize

    9.6MB

  • memory/2656-117-0x0000000001FF0000-0x0000000002070000-memory.dmp

    Filesize

    512KB