Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2024, 18:06

General

  • Target

    02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe

  • Size

    866KB

  • MD5

    3fe23b6eea62a2dde12bdbf41f08a9f8

  • SHA1

    521e2a6fb7e951944d21c7124371e273f7399419

  • SHA256

    02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799

  • SHA512

    db59d8ec5ef85cff06c43a4897b348f8a5d3fdb6a25316162ae66eacdc6925b080e52645e2c9f959d3d2c7ebc3dfacd5552f74f2017036a4588004e7328d3e13

  • SSDEEP

    24576:RueYYFNwOx0CJ75WEcvLlhVN84RUAY4htSB:RuiXwS0s1WEUtJhq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe
    "C:\Users\Admin\AppData\Local\Temp\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\launch.exe
      C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\launch.exe "e02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe" "02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe" "1e2431c5aee742d78a1642fb5d7bfbc8" dec
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:4536
    • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe
      C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe /path="C:\Users\Admin\AppData\Local\Temp\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:1428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\46DE64130271B61D13A0FAFD9465377C_D8840AF2A28227DC3600C6CA04024DE2

    Filesize

    2KB

    MD5

    08d8797375028c89b30522aaebc8fa6f

    SHA1

    d00d260556bf146c61d131cc821b338a3f1e0d4d

    SHA256

    26754ece97d78d790021621c4c6ff7a5f2bc60abdf96f46949c8a9ec64331616

    SHA512

    aa050752bc4f02b7ec7a065f72a223ecd1828b5f7d5942b4f5fbdebe38dc395c8695910c263e0c48dbc872e51949b85599cc574842292dbb6c692171f677a2b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BBB768C456D9E2DCD3EF595C400D483D_64C05B9EB32FC3D0CE6CB126561EEBFF

    Filesize

    1KB

    MD5

    4d4d4f0936c9b22c03799cfb07e17cf4

    SHA1

    98a2adaf3dd7b39417604c18ee72ef67c68db6b0

    SHA256

    a7ccc2a20d1728e18adfa0a93e8dfd7fe0e7a634890d3325ab2756a329981d80

    SHA512

    0f45f8f02895b8415b470a82cf0b1e1d14d96e6a19385e0ec4668aab9cb37303428768ba0dd5b0b711130a92c8da8165775bb1d124855f0470491691e083c7ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\46DE64130271B61D13A0FAFD9465377C_D8840AF2A28227DC3600C6CA04024DE2

    Filesize

    466B

    MD5

    d5baf2cf937ab9b5dfe7edb308b0f680

    SHA1

    7fb959d125633d4aae2107a59dbe08326b599b3e

    SHA256

    fd31abab19e0e7c23066fe32f53f320df446b438f2cb6d246f832bd12ce54fc1

    SHA512

    7e111cc534fc14edefacbcf9dc7e9cbe38a9970ee280792fc957d4ee18053893b527b1829c224ccd819773b7421e596877822a64f1fc5a552028bb108e5f2e67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BBB768C456D9E2DCD3EF595C400D483D_64C05B9EB32FC3D0CE6CB126561EEBFF

    Filesize

    444B

    MD5

    2d8c614030ba15fd44d7cea59db32ff9

    SHA1

    22e25c0e6aad08af4349faef0b50959a34a73823

    SHA256

    84691857a1446e68f09d299562a3f86369253d60d865ed4847547527b79c2bd4

    SHA512

    f18fe67a5b508dc5c2fda53a1b341499cfe82eaf3baab6f5b0873fc06387d90d1c58fd56dd6679ac6f79d63f7f9f7fd3d65f4f1fcb6350db0ad8fb415c3098c7

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe

    Filesize

    384KB

    MD5

    40a9984f28a963d3f45195ad849bcbd4

    SHA1

    800d769ecf5d385a43372a40a9d547992e27e849

    SHA256

    96275952405c971ccf9e67623ad894045e1fa8103ee3d8a3a313d5057059dd50

    SHA512

    61767b014653cf9cafee8112628a42f5119b76d79d2f482dae93cb95b01a1d43826ade32674058e38c28ff83973ffd8f424c6430ce8c4cb25878c4f4b62ddcfa

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe.config

    Filesize

    690B

    MD5

    bca0ea75b6940aa86960d7b9098a5998

    SHA1

    3d57f82158ac72c7eb2e72ba19a80485d8103130

    SHA256

    5a494295936d2170433864b449257bbac7b976413811a0b6339e37f83a891f8d

    SHA512

    260a05c509d874239a27798421ee75ac7e2bbc0d2a0485122740e8b8adcd8f43f98f7633cef278d9f7f4a132633b4b1cdf4b641e2233e891dce2d6eb6e75c3d3

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\e02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe

    Filesize

    384KB

    MD5

    df9020132ff7ef749aa4b7ccbfae63f7

    SHA1

    ce1c9f314674dc1e4bf54ea33008e87eae450813

    SHA256

    a8c1a879653fb7e5f5c456b00820cbfbebeae0267456a17fae246c7754e7a68f

    SHA512

    1f505849a45160b80d9d8d8bee9f3d60d7a94d47f243dff5b230d763910245d59c954e77edcd37f402b027123dcfae2bde4df39c793d10e2adffabc1e69e3f5a

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\installer.exe

    Filesize

    428KB

    MD5

    b5f36310a7563c468531eda68c568d5f

    SHA1

    854e7fb802a96f963f14e10b5b15d7350696f811

    SHA256

    9c6fe0e1a7790f9f04ffb25ef7fc4a5e8ba4e1fed823b4465abcefec695b915e

    SHA512

    5ee0a7de2da566ab9dc26746df9c07551b390a3ac3785fa0e67ee1dc94fe90c67d647cb56bcd00b83e62a15ece36b57f4c83866d42a45d12bf0cb42202cdad35

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\launch.exe

    Filesize

    26KB

    MD5

    1a333b5e9cf28be2febedfd805e2cf5c

    SHA1

    24c3a57cf6f2553d006a5e03155b056b71e96e0f

    SHA256

    da98a5ab1f2a1437791e5b3fe8eda52c8119ff852a76189fcfc2e8e2bb5b2ee2

    SHA512

    42b2ce79719f616dd5623e28fe8bef5318a0dce9b67537907f459e9d960921f0df12b3d253dd4366184b0b0cd686d72de6c3ecf52a133843a460a44bf0fdbe91

  • C:\Users\Admin\AppData\Local\Temp\DM\02cbafc7ad4719018450420528c9af3c89c97c05feaecc0d211da32ccb79e799.exe\d278ce3660194d20bfe55f17660a671d\launch.exe.config

    Filesize

    359B

    MD5

    05a59e8e79546860cf1e351e32e69404

    SHA1

    aef4ad7bcbd79f99feb7100f05938721f12f7dce

    SHA256

    a368ee85ee624c5adaad674a9b5986f17de7020206e93755c0d086714fcc9430

    SHA512

    6ec6d988e5c4736ca56118926fef22f952991688bee8408b782273622f2a1f5d8c57850bdb1992f70c23df42366bec56527ad1395484aa5916d84e1249d159fa

  • C:\Users\Admin\AppData\Local\Temp\nsf3B55.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • memory/1428-43-0x00007FFBD9120000-0x00007FFBD9AC1000-memory.dmp

    Filesize

    9.6MB

  • memory/1428-49-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/1428-68-0x00007FFBD9120000-0x00007FFBD9AC1000-memory.dmp

    Filesize

    9.6MB

  • memory/1428-41-0x00007FFBD9120000-0x00007FFBD9AC1000-memory.dmp

    Filesize

    9.6MB

  • memory/1428-42-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/1428-61-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/1428-44-0x000000001B470000-0x000000001B47E000-memory.dmp

    Filesize

    56KB

  • memory/1428-45-0x000000001C170000-0x000000001C63E000-memory.dmp

    Filesize

    4.8MB

  • memory/1428-46-0x000000001C6E0000-0x000000001C77C000-memory.dmp

    Filesize

    624KB

  • memory/1428-47-0x000000001B420000-0x000000001B428000-memory.dmp

    Filesize

    32KB

  • memory/1428-48-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/1428-60-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/1428-50-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/1428-51-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/1428-59-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/1428-54-0x0000000020280000-0x00000000202E2000-memory.dmp

    Filesize

    392KB

  • memory/1428-56-0x00007FFBD9120000-0x00007FFBD9AC1000-memory.dmp

    Filesize

    9.6MB

  • memory/1428-57-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/1428-58-0x0000000000F30000-0x0000000000F40000-memory.dmp

    Filesize

    64KB

  • memory/4536-15-0x0000000073130000-0x00000000736E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4536-29-0x0000000073130000-0x00000000736E1000-memory.dmp

    Filesize

    5.7MB

  • memory/4536-16-0x0000000002D00000-0x0000000002D10000-memory.dmp

    Filesize

    64KB

  • memory/4536-17-0x0000000073130000-0x00000000736E1000-memory.dmp

    Filesize

    5.7MB