Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 11:42 UTC

General

  • Target

    c5ca6a4a9d08093878f954b7de290224.exe

  • Size

    581KB

  • MD5

    c5ca6a4a9d08093878f954b7de290224

  • SHA1

    7cf652b72008912e3628d2f542d5e9e01d4730cd

  • SHA256

    15bbff7debe9fa5aaa801cfe35844d6584d7ce7ebea1d2c5606594dbbba0a1ce

  • SHA512

    555f47658ffd12a62f240b89207b4bcd72285861168f1e4673c2aca7a88dcf690220efbb03c062b4c65c7c3c06923e401a1d220d617f5fcf7e99e489ccf9446d

  • SSDEEP

    12288:uoMDtCi7NFlZnNqZ9xGrLpZ0ZHEqtgb0U0:ufplNFgxG5eZngb0T

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5ca6a4a9d08093878f954b7de290224.exe
    "C:\Users\Admin\AppData\Local\Temp\c5ca6a4a9d08093878f954b7de290224.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
      C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.97199.com/install2/?sl3
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2524
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
        3⤵
          PID:2600
      • C:\Users\Admin\AppData\Local\Temp\nbfile1.exe
        C:\Users\Admin\AppData\Local\Temp\nbfile1.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\newsetup.vbs"
          3⤵
            PID:2568
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\1.vbs"
            3⤵
              PID:2908

        Network

        • flag-us
          DNS
          down.97199.com
          IEXPLORE.EXE
          Remote address:
          8.8.8.8:53
          Request
          down.97199.com
          IN A
          Response
        • 204.79.197.200:443
          ieonline.microsoft.com
          tls
          IEXPLORE.EXE
          799 B
          7.7kB
          10
          13
        • 204.79.197.200:443
          ieonline.microsoft.com
          tls
          IEXPLORE.EXE
          1.0kB
          7.7kB
          11
          13
        • 204.79.197.200:443
          ieonline.microsoft.com
          tls
          IEXPLORE.EXE
          779 B
          7.6kB
          9
          12
        • 8.8.8.8:53
          down.97199.com
          dns
          IEXPLORE.EXE
          60 B
          121 B
          1
          1

          DNS Request

          down.97199.com

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2a32efd1b9cc81ace867e90306ba8b3f

          SHA1

          3e666c41536135202f5b8351636cc451c5396859

          SHA256

          4808387e1f6fbeab84871d933c864f7cf1df17876a9a52f2be4edf4787c7c492

          SHA512

          4310fd433934a906d2c53177a1af9d17bddf85858c04a6551bae3b0db22d643c73e1237b6ee6fcbe76f30ac4ab3725c7e134b7073fdbe8622eee621498ff30dd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          27f2bc7b61f2c804c4ceff08eaf92cd3

          SHA1

          5e4bf9289f518eb8f86a955a6f4170610a600838

          SHA256

          531c73f8524a3342c66a436d8a068e25b451f1bb0f69daeab46c21de04b854c1

          SHA512

          52a14dbabaf9454b7c681a2e081b4c6b955abf6593bf9055426932fe2617349e4af8c91aa01c9519e25260e97a1615426a6b3e9f3048f1e623ddddcb4020d8b0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4967fda583e907d67dd9530ec4e0eaee

          SHA1

          2f5da7d4147de9ea873d63d8451e8f4e9e2b4ef4

          SHA256

          c62ece82b1dfe595bda8c66980b3c38ec29b833c0b65ab7dc53659d24d59a5a0

          SHA512

          1aeb9db1926d7b42d039a98de84647e79ec8f8925d3c6be5ed3c122d1fb10611d1b23da6f91d05b1853d5af06a3a4f9a159b4cbe438fd27e2c14a488cdfa380e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e07b415b75640d1b93f4b95c69de2687

          SHA1

          cbd5879c154547eaa85419499e05f95976149e6a

          SHA256

          5d4d2e0306ce6c980098107aaff990d34995c619c1f1b969935866bfa5e242c6

          SHA512

          25a1f094d5c5e67c5db2b3cfddb6f1282c9522d2eea1a24ed4c340a879c1201c9f26653ca9cc37f735ce2b48f12d119d01612f3e3b77552eed67337ff6659107

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2a1c72ae69bf732f03f08cd8f28b5892

          SHA1

          d39634360dac71f124bed2a1e7ff9852f447e53b

          SHA256

          06b926c0dc41fa10c6a7e5ec1c742263bffba39ca2f3a8298c3c0f4a9a0de622

          SHA512

          7433221349108a472909d47f3e3b07240e365165624ea1cc4b1ed7361448675df0bd7371c1718c9f63e106305111e6ae96104b6c1bb99d9a6f849b12f2b04309

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          12da049d8a0b6d4155ecf0af9ff8c400

          SHA1

          15ccb6cafdc09f42cf4ea1b38f000dc1a0e5a3ee

          SHA256

          503d38531a218e363ee180ac89d106dea7236e69ec88c03ca2a6faed6a644cf2

          SHA512

          53b75fb6e8e9b8f5def0c2b926863fd5fa65010b8edc90fbf17acc044c5621ce2ec971f002211087c75c6466252c74e2effa92d2baac65977d6a31ca338c6757

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8b8b0a16265c237d6cf5a1c7374dc74a

          SHA1

          448bab100a6db00ccc6681c06b1a6222ba44ca63

          SHA256

          231014c2cfe0256dadff334265ceeeb2a0cd35aa1c6ff1a13a335456f6b7e1d7

          SHA512

          95d23dd3effd5e9d3343edf6f4f4e8eedeedfdc955f084bff5d260c6e494387102b8ffdf4bd40abd5238dcb705fddae3aaffc1736f6906e31b12ed05d0b8f94c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d8ddc6bff7677b72dd484a55f2bbe23a

          SHA1

          c497fb86dd2aeaeab06a5f6b533e599c4259b43a

          SHA256

          d0e1f78cc03ebf44000c8ffea85ea2a6c94815c6dda6c036ab4406a5cbbe60da

          SHA512

          30c03ed10b673e765a35d9d5bef0f86a1b079d319a64cf20d83837026fc43b149a5b4d5136564a553c92bb0e36a8d97e34caa7ba652942d96fdd4e28e2f12651

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8325d1df1c94000b747b201ba8aeff17

          SHA1

          d9acff201e9952c5525240133345f7cef7f79fe0

          SHA256

          115011dd7b4b76270c607c50c532eec6c579d345ed1ee67a178ecf9e4c55b4bb

          SHA512

          7facfa034acb85ef82b7981bedb1c631db352d7f5288a3ecf2e1f5a1d4cf525434451f64ad947ed0003cdd567dba7bd4ee566a93f61200fc1097954aaaa18d2b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f4d6548bfc2d6f0f2f110070fae8a12d

          SHA1

          aab533b65be7ddcdde1a50318ff05175bfca8b15

          SHA256

          710d4b15ed67f8a03ee08eb2b2c26db4d361bc1c380795e9a13dd5da1d5b86b8

          SHA512

          ec1cefaa49147904964560f1c30deef0cc0b8a4901a37c6967afe274bc78f892339f13418896ddb4fc1f66f0aca8207e1fec36e68126a91344d4b821f11fb0c3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          54dea612fc6a7319047d2c13f4af1712

          SHA1

          827480853f962792586c1b22cf359cb1c2bdc9a5

          SHA256

          98eaef5ace806a56e369c2d5c03c6f780802e9a75332ab088722388433412068

          SHA512

          00c1bc2bddc8926b6c40414ad47cc55dacf4885d7fb54f169e8e50ee19bf40861df9cdbc84d9d5c6adfa6537055808e40fc041a3e7013449beb1b7b5596642e8

        • C:\Users\Admin\AppData\Local\Temp\Cab57C4.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar599F.tmp

          Filesize

          175KB

          MD5

          dd73cead4b93366cf3465c8cd32e2796

          SHA1

          74546226dfe9ceb8184651e920d1dbfb432b314e

          SHA256

          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

          SHA512

          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

        • C:\newsetup.vbs

          Filesize

          651B

          MD5

          4736e7158c27f244482f5a614b9dbdae

          SHA1

          d3a0e95a81e9e3ec95cfd596b25749a0e24e27b9

          SHA256

          b8229bc8d6b0013858fb9599cb510afa4566a439164b2c7444c449540a124acc

          SHA512

          cebf895dd3ec3822c42b78bac49c685b063cb5afcbcfb3850b073cb118d086c5fa75ec50b6e73d90e14f2c6b595752ad87910b8cf27378424d72a9ea309bf824

        • \Users\Admin\AppData\Local\Temp\nbfile0.exe

          Filesize

          467KB

          MD5

          74869a0346ab36bbba85022612505121

          SHA1

          2cd02f46f2f9f46eaf15fce40a3bf4781f80cf8a

          SHA256

          6de866b5c8abb1db9b2be231b365c1aa029118fbc58823f443f00e3a33dff18a

          SHA512

          723812083113cff82aa5e2243759c572518865e351cc81b7c2b85a05557862dbbd7a98b964ff6f3aa3802bb5d4dab01a14147211495fc5803d9ddb7b715f4de5

        • \Users\Admin\AppData\Local\Temp\nbfile1.exe

          Filesize

          52KB

          MD5

          c4ddf11ebdbf9d8397d710d2cb4e2fab

          SHA1

          8008c97e7d6ff92deb3e1755a614f4afedca92b9

          SHA256

          67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

          SHA512

          3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

        • memory/2044-9-0x0000000000340000-0x00000000003CA000-memory.dmp

          Filesize

          552KB

        • memory/2044-8-0x0000000000340000-0x00000000003CA000-memory.dmp

          Filesize

          552KB

        • memory/2044-28-0x0000000000400000-0x0000000000497000-memory.dmp

          Filesize

          604KB

        • memory/2956-12-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/2956-13-0x0000000000020000-0x0000000000022000-memory.dmp

          Filesize

          8KB

        • memory/2956-15-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.