Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 03:33

General

  • Target

    bd8ebc8a73354d912d96648c0a4924ad.exe

  • Size

    1.2MB

  • MD5

    bd8ebc8a73354d912d96648c0a4924ad

  • SHA1

    341395c5e8160febd846c8e45897d60e5d73c985

  • SHA256

    ab5fd5b542977645488e296770bbb76137d4893ecb9eddaf3e492bce5f5aa6ce

  • SHA512

    4b4db5d676b158b7861ffaa9ad5287d0315d61f0f8c44ece5abb2572047ab3729694b6fec55e3a581fd23cb3447e476d6299b8e9dd176f1f40b0cf9e08b184e7

  • SSDEEP

    24576:ZB51ZMgyuhpuwvq8qLduQgfbZi9jnv5GtWKjN0:p1ZbhTvq8qLBgjZsjKWK50

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd8ebc8a73354d912d96648c0a4924ad.exe
    "C:\Users\Admin\AppData\Local\Temp\bd8ebc8a73354d912d96648c0a4924ad.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c LvTasfZdX
        3⤵
          PID:2624
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Rapiva.mov
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2412
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2548
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^pAvofqIrkohjdrCgCTcBhWrPbuXmHqloifUaNcpwSZexQIXXPwRGojGjbGKoroclYytqolBuKxJgUJZOpqKGoDZUJIVuKqXJDRcKDXOFmLVODaaNHWZrnPwxulsAgccJvZKehgkkktubI$" Sento.mov
              5⤵
                PID:2428
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Arteria.exe.com
                Arteria.exe.com U
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:2396
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Arteria.exe.com
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Arteria.exe.com U
                  6⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  PID:2812
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\qfysjodts.vbs"
                    7⤵
                    • Blocklisted process makes network request
                    • Modifies system certificate store
                    PID:2224
              • C:\Windows\SysWOW64\PING.EXE
                ping localhost -n 30
                5⤵
                • Runs ping.exe
                PID:2448
        • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
          "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
          2⤵
          • Drops startup file
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: AddClipboardFormatListener
            PID:2332

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        67KB

        MD5

        753df6889fd7410a2e9fe333da83a429

        SHA1

        3c425f16e8267186061dd48ac1c77c122962456e

        SHA256

        b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

        SHA512

        9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        b22c2a1df9b5aae35347920c4c73519e

        SHA1

        064a5a5378c7904b8cb95c011105a583d0f8515a

        SHA256

        59e334a16a6acf0435409264204c2fb03665244e2eab996e78b318036b06f47e

        SHA512

        3bcb4184d68863f22d9c056b5a2f4b57b9b24cc64a715db77e8e48fe6c6e83eaff1a89d6db59177c8e621aff100389b314a5dbf73dc8b5c5c247e4bb39601ddd

      • C:\Users\Admin\AppData\Local\Temp\8B50.tmp

        Filesize

        313B

        MD5

        bee55e52500f967c3d9402e05dd57f65

        SHA1

        d8dc65ec97c6288e1fd10b8c4f8502e5a8a5bbf6

        SHA256

        b90eae4b05d321efc4519963349c1775dcea8e3b0ae53b50285545380b6539c0

        SHA512

        b8624a934fb74760f5b231ca97e89074b227ad9fe3bb08b01a81cf35760f06b346f395cf6683df5881dc429ae77af0d0a07cfeb9c9ec127e4e917191bf8c91da

      • C:\Users\Admin\AppData\Local\Temp\CabBB75.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Disconosci.mov

        Filesize

        139KB

        MD5

        21f79182b467153526fb9e97b33ef0d5

        SHA1

        c9f7939dc228b53f3993e6262f609bd915187ef1

        SHA256

        4cae657014aa9d240dca1339626ea9ff4442695b7c758e77146803da475d31a0

        SHA512

        8ce012401417e02c90b09f18cf736355fb2628f0f97bc4fa6bbab3e123ae107713e774ddd7628748d2407443e001734a6d0d8418d849827104d5c0721a88ed37

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mutato.mov

        Filesize

        713KB

        MD5

        a4f3ac1965f029dfee419427023a353f

        SHA1

        747f357205809bb3732d65d1dd4c814ec2c5bf47

        SHA256

        13cf314114608f1b8277ca7647b5210a60275469567967080a689c6c0fdf4533

        SHA512

        7f471b096547015c69a886c7d376a352fc7c93aee7ed18b57079768027d557902d5c32a314ab4bee00f79c284981e2c3571e8314b9914bf00e984503ec450178

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rapiva.mov

        Filesize

        497B

        MD5

        83641c3aa461594855a69ea3be59c332

        SHA1

        d45ea8168604649acc3a896c4b4a06ed63f8413e

        SHA256

        e64a1cb9aa2c169c8edb5d962f9bc679f852b6ae4364cca86e7b01b1c0d4479d

        SHA512

        5bca38d69d9f959d762e52fa69e3471c90f052d664f7fb899183fa099835e1a03e71fa14379ad99f5198d5d64ac2522145e3bc6056a67af0a7d4412e5a9cd084

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sento.mov

        Filesize

        872KB

        MD5

        37612b1671d135e0be914f0106f397f7

        SHA1

        cde049dcdc196d2174925b5a06fbb22d424ad2ac

        SHA256

        7167e77a7461f0acb586e23ec43ad218fa5cea2ecd6dd80c62d35be452680912

        SHA512

        4d08c4b79fcb70d70a82e365231354f5f6e67d0a3ccb58a97733e416cf731422479525a45a0e3a782dc045420e89f6fa79e3a8665ff2ef44a8fb1e2dc6f621a5

      • C:\Users\Admin\AppData\Local\Temp\TarC8A5.tmp

        Filesize

        175KB

        MD5

        dd73cead4b93366cf3465c8cd32e2796

        SHA1

        74546226dfe9ceb8184651e920d1dbfb432b314e

        SHA256

        a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

        SHA512

        ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

      • C:\Users\Admin\AppData\Local\Temp\qfysjodts.vbs

        Filesize

        135B

        MD5

        ed99ea59d21859e2d8f660613212451e

        SHA1

        93fe59d7c6e3aec38b3af35ec8caa8cf40e98900

        SHA256

        547eea66089da66731776418e504c4e292e55106c6f80802845a67d9ad684131

        SHA512

        2744d9891f5588c290519244ada7ce0f4d69d1a506631818a74e1179ac17410fb1b741183cbc795e79c87952251adfd455ccfe7399b00143fb0ee7a673ea5472

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Arteria.exe.com

        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • \Users\Admin\AppData\Local\Temp\New Feature\4.exe

        Filesize

        356KB

        MD5

        63298373ec0b3d06cd3b6e9cffd4ab79

        SHA1

        2f6482a9d617e7d0bc21e78258cb08677de52e69

        SHA256

        eebd782f6612da1133b0e130bf751578de50cadfd0268b98ce4a31815edc636c

        SHA512

        3948a304b82c055e37082948668c11b39cb3c47adc729cb2d7018fde5b78441f84420b101122360906f03c5299eb543082cc55513bfc84513042416faa5276a1

      • \Users\Admin\AppData\Local\Temp\New Feature\vpn.exe

        Filesize

        1.0MB

        MD5

        c947291b42012d2f82b7d9896630584b

        SHA1

        0854ce780aa21d642d03269fb6977370af1a254c

        SHA256

        b317a4e36ea8c4f943d6f1d3f933bb96d29aa6ba16c48a7b5c9db07b5a17bbd2

        SHA512

        f74987266c2df4acfb2c02a162e0028ca2a7b3c611ff041531c34d3a0cf5bcd4f458f846713e1384731087848c42a84b6b51ed6e6f6ead6a75c14845e808276e

      • \Users\Admin\AppData\Local\Temp\nsi1739.tmp\UAC.dll

        Filesize

        14KB

        MD5

        adb29e6b186daa765dc750128649b63d

        SHA1

        160cbdc4cb0ac2c142d361df138c537aa7e708c9

        SHA256

        2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

        SHA512

        b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

        Filesize

        256KB

        MD5

        9ea50c3e511be002f8dab42170c34c17

        SHA1

        7149081ba33728a85c5dd5e5fa1e31e6e1d471ed

        SHA256

        8d5cf696b6ad3e101eef8e5a773b88f48769f8a0fbbaf8b36639103c509cff2c

        SHA512

        49887e2895c1623cbf97a2ac36e8e29877d52f228b2c69430ae52d36e60578d17ca7f5fc71ea897396b576aac34c7291887d8fbd3f8dee7a183eb66f600a4709

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

        Filesize

        192KB

        MD5

        e8932404ff2a8366b5958af431dda9e1

        SHA1

        cb8353215eace4fd9847984301f3525b441f67fd

        SHA256

        a8854a46e410c2448b7d9ead64a4468eb2f8b05fffd3788ec0d7186effbabb5e

        SHA512

        5e68083b4c26f046c87d552279af5db1ba95f247364b5646a4e0f6a56739de94f08a84183b18dc0903652d313631b6320ba98f743575300071157e6c068f9568

      • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

        Filesize

        128KB

        MD5

        f2ec8882fabd22c61dfd8b5c28324c9f

        SHA1

        2bedb7f0850043f567fadb7a6ac1989c4647e643

        SHA256

        7d94da9c899c74fbcca097753e8fba6e15397d52167a211298a1c2fa09b9a72d

        SHA512

        30942b0db321cc5eb15401c2e7b637181a0a9b85c8443e5f8a087b970bdcd9e51e34f7cac7122dd7b7b6c1d3666036e912dd4a5775d331bec491096228fc2cb5

      • memory/2332-78-0x0000000000300000-0x0000000000400000-memory.dmp

        Filesize

        1024KB

      • memory/2332-79-0x0000000000400000-0x0000000003255000-memory.dmp

        Filesize

        46.3MB

      • memory/2332-94-0x0000000000300000-0x0000000000400000-memory.dmp

        Filesize

        1024KB

      • memory/2604-55-0x0000000000270000-0x0000000000296000-memory.dmp

        Filesize

        152KB

      • memory/2604-77-0x0000000000270000-0x0000000000296000-memory.dmp

        Filesize

        152KB

      • memory/2604-54-0x0000000003340000-0x0000000003440000-memory.dmp

        Filesize

        1024KB

      • memory/2604-62-0x0000000000400000-0x0000000003255000-memory.dmp

        Filesize

        46.3MB

      • memory/2604-75-0x0000000000400000-0x0000000003255000-memory.dmp

        Filesize

        46.3MB

      • memory/2812-87-0x0000000003DD0000-0x0000000003DF7000-memory.dmp

        Filesize

        156KB

      • memory/2812-83-0x0000000003DD0000-0x0000000003DF7000-memory.dmp

        Filesize

        156KB

      • memory/2812-82-0x0000000003DD0000-0x0000000003DF7000-memory.dmp

        Filesize

        156KB

      • memory/2812-103-0x0000000003DD0000-0x0000000003DF7000-memory.dmp

        Filesize

        156KB

      • memory/2812-81-0x0000000003DD0000-0x0000000003DF7000-memory.dmp

        Filesize

        156KB

      • memory/2812-88-0x0000000003DD0000-0x0000000003DF7000-memory.dmp

        Filesize

        156KB

      • memory/2812-84-0x0000000003DD0000-0x0000000003DF7000-memory.dmp

        Filesize

        156KB

      • memory/2812-86-0x0000000003DD0000-0x0000000003DF7000-memory.dmp

        Filesize

        156KB

      • memory/2812-85-0x0000000003DD0000-0x0000000003DF7000-memory.dmp

        Filesize

        156KB