Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 03:33

General

  • Target

    vpn.exe

  • Size

    1.0MB

  • MD5

    c947291b42012d2f82b7d9896630584b

  • SHA1

    0854ce780aa21d642d03269fb6977370af1a254c

  • SHA256

    b317a4e36ea8c4f943d6f1d3f933bb96d29aa6ba16c48a7b5c9db07b5a17bbd2

  • SHA512

    f74987266c2df4acfb2c02a162e0028ca2a7b3c611ff041531c34d3a0cf5bcd4f458f846713e1384731087848c42a84b6b51ed6e6f6ead6a75c14845e808276e

  • SSDEEP

    24576:MjgtWQjp7VvOpqsnuPhKbDxMfnv6NsoZ:Mju7j3vOpqPh4D634

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vpn.exe
    "C:\Users\Admin\AppData\Local\Temp\vpn.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c LvTasfZdX
      2⤵
        PID:1972
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Rapiva.mov
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^pAvofqIrkohjdrCgCTcBhWrPbuXmHqloifUaNcpwSZexQIXXPwRGojGjbGKoroclYytqolBuKxJgUJZOpqKGoDZUJIVuKqXJDRcKDXOFmLVODaaNHWZrnPwxulsAgccJvZKehgkkktubI$" Sento.mov
            4⤵
              PID:2680
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Arteria.exe.com
              Arteria.exe.com U
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2568
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Arteria.exe.com
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Arteria.exe.com U
                5⤵
                • Executes dropped EXE
                • Checks processor information in registry
                • Suspicious use of WriteProcessMemory
                PID:2528
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\gojfupoq.vbs"
                  6⤵
                  • Blocklisted process makes network request
                  • Modifies system certificate store
                  PID:1668
            • C:\Windows\SysWOW64\PING.EXE
              ping localhost -n 30
              4⤵
              • Runs ping.exe
              PID:2052

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        67KB

        MD5

        753df6889fd7410a2e9fe333da83a429

        SHA1

        3c425f16e8267186061dd48ac1c77c122962456e

        SHA256

        b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

        SHA512

        9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        81feb25c24c2461f369b6a7124974526

        SHA1

        522658f8f01601388dfd795c25c44ce122611cce

        SHA256

        a67ec6f37abdf3722d9d632e875764dc1ddbb9904209a533d4b2390c25a911f3

        SHA512

        910aa4c1c1fcde4e4e755c543a9b8a05c3373cf91af0c48d4c70515927e563e457ca8781f16baf328c51c7488030214a13a80fd02242b8beb7886270fbbdf419

      • C:\Users\Admin\AppData\Local\Temp\79F2.tmp

        Filesize

        313B

        MD5

        bee55e52500f967c3d9402e05dd57f65

        SHA1

        d8dc65ec97c6288e1fd10b8c4f8502e5a8a5bbf6

        SHA256

        b90eae4b05d321efc4519963349c1775dcea8e3b0ae53b50285545380b6539c0

        SHA512

        b8624a934fb74760f5b231ca97e89074b227ad9fe3bb08b01a81cf35760f06b346f395cf6683df5881dc429ae77af0d0a07cfeb9c9ec127e4e917191bf8c91da

      • C:\Users\Admin\AppData\Local\Temp\CabB5F9.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Disconosci.mov

        Filesize

        139KB

        MD5

        21f79182b467153526fb9e97b33ef0d5

        SHA1

        c9f7939dc228b53f3993e6262f609bd915187ef1

        SHA256

        4cae657014aa9d240dca1339626ea9ff4442695b7c758e77146803da475d31a0

        SHA512

        8ce012401417e02c90b09f18cf736355fb2628f0f97bc4fa6bbab3e123ae107713e774ddd7628748d2407443e001734a6d0d8418d849827104d5c0721a88ed37

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mutato.mov

        Filesize

        713KB

        MD5

        a4f3ac1965f029dfee419427023a353f

        SHA1

        747f357205809bb3732d65d1dd4c814ec2c5bf47

        SHA256

        13cf314114608f1b8277ca7647b5210a60275469567967080a689c6c0fdf4533

        SHA512

        7f471b096547015c69a886c7d376a352fc7c93aee7ed18b57079768027d557902d5c32a314ab4bee00f79c284981e2c3571e8314b9914bf00e984503ec450178

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rapiva.mov

        Filesize

        497B

        MD5

        83641c3aa461594855a69ea3be59c332

        SHA1

        d45ea8168604649acc3a896c4b4a06ed63f8413e

        SHA256

        e64a1cb9aa2c169c8edb5d962f9bc679f852b6ae4364cca86e7b01b1c0d4479d

        SHA512

        5bca38d69d9f959d762e52fa69e3471c90f052d664f7fb899183fa099835e1a03e71fa14379ad99f5198d5d64ac2522145e3bc6056a67af0a7d4412e5a9cd084

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sento.mov

        Filesize

        872KB

        MD5

        37612b1671d135e0be914f0106f397f7

        SHA1

        cde049dcdc196d2174925b5a06fbb22d424ad2ac

        SHA256

        7167e77a7461f0acb586e23ec43ad218fa5cea2ecd6dd80c62d35be452680912

        SHA512

        4d08c4b79fcb70d70a82e365231354f5f6e67d0a3ccb58a97733e416cf731422479525a45a0e3a782dc045420e89f6fa79e3a8665ff2ef44a8fb1e2dc6f621a5

      • C:\Users\Admin\AppData\Local\Temp\TarB738.tmp

        Filesize

        175KB

        MD5

        dd73cead4b93366cf3465c8cd32e2796

        SHA1

        74546226dfe9ceb8184651e920d1dbfb432b314e

        SHA256

        a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

        SHA512

        ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

      • C:\Users\Admin\AppData\Local\Temp\gojfupoq.vbs

        Filesize

        141B

        MD5

        022c07e5d278f49894f214ea1f7bfb23

        SHA1

        23bcfdd8dfb1236609193b09d24b6cb0ed8e7d2b

        SHA256

        89ff44084040dfd2a2a8d83d70994a01884989aae9bff40bce175a387a973400

        SHA512

        e293b2cead14dca4c062c3087f9c56e860bb83d72efc9435ca3eadd5aeb578da96ccf42c9270f1ca1bfec9049db301e6f85428e34816abdd7a5c0de52c36d101

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Arteria.exe.com

        Filesize

        872KB

        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • memory/2528-24-0x0000000000150000-0x0000000000151000-memory.dmp

        Filesize

        4KB

      • memory/2528-31-0x0000000003980000-0x00000000039A7000-memory.dmp

        Filesize

        156KB

      • memory/2528-30-0x0000000003980000-0x00000000039A7000-memory.dmp

        Filesize

        156KB

      • memory/2528-43-0x0000000003980000-0x00000000039A7000-memory.dmp

        Filesize

        156KB

      • memory/2528-29-0x0000000003980000-0x00000000039A7000-memory.dmp

        Filesize

        156KB

      • memory/2528-28-0x0000000003980000-0x00000000039A7000-memory.dmp

        Filesize

        156KB

      • memory/2528-27-0x0000000003980000-0x00000000039A7000-memory.dmp

        Filesize

        156KB

      • memory/2528-26-0x0000000003980000-0x00000000039A7000-memory.dmp

        Filesize

        156KB

      • memory/2528-25-0x0000000003980000-0x00000000039A7000-memory.dmp

        Filesize

        156KB