Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 11:42

General

  • Target

    c5ca6a4a9d08093878f954b7de290224.exe

  • Size

    581KB

  • MD5

    c5ca6a4a9d08093878f954b7de290224

  • SHA1

    7cf652b72008912e3628d2f542d5e9e01d4730cd

  • SHA256

    15bbff7debe9fa5aaa801cfe35844d6584d7ce7ebea1d2c5606594dbbba0a1ce

  • SHA512

    555f47658ffd12a62f240b89207b4bcd72285861168f1e4673c2aca7a88dcf690220efbb03c062b4c65c7c3c06923e401a1d220d617f5fcf7e99e489ccf9446d

  • SSDEEP

    12288:uoMDtCi7NFlZnNqZ9xGrLpZ0ZHEqtgb0U0:ufplNFgxG5eZngb0T

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5ca6a4a9d08093878f954b7de290224.exe
    "C:\Users\Admin\AppData\Local\Temp\c5ca6a4a9d08093878f954b7de290224.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
      C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down.97199.com/install2/?sl3
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2524
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\nbfile0.exe
        3⤵
          PID:2600
      • C:\Users\Admin\AppData\Local\Temp\nbfile1.exe
        C:\Users\Admin\AppData\Local\Temp\nbfile1.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2564
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\newsetup.vbs"
          3⤵
            PID:2568
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\1.vbs"
            3⤵
              PID:2908

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2a32efd1b9cc81ace867e90306ba8b3f

          SHA1

          3e666c41536135202f5b8351636cc451c5396859

          SHA256

          4808387e1f6fbeab84871d933c864f7cf1df17876a9a52f2be4edf4787c7c492

          SHA512

          4310fd433934a906d2c53177a1af9d17bddf85858c04a6551bae3b0db22d643c73e1237b6ee6fcbe76f30ac4ab3725c7e134b7073fdbe8622eee621498ff30dd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          27f2bc7b61f2c804c4ceff08eaf92cd3

          SHA1

          5e4bf9289f518eb8f86a955a6f4170610a600838

          SHA256

          531c73f8524a3342c66a436d8a068e25b451f1bb0f69daeab46c21de04b854c1

          SHA512

          52a14dbabaf9454b7c681a2e081b4c6b955abf6593bf9055426932fe2617349e4af8c91aa01c9519e25260e97a1615426a6b3e9f3048f1e623ddddcb4020d8b0

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          4967fda583e907d67dd9530ec4e0eaee

          SHA1

          2f5da7d4147de9ea873d63d8451e8f4e9e2b4ef4

          SHA256

          c62ece82b1dfe595bda8c66980b3c38ec29b833c0b65ab7dc53659d24d59a5a0

          SHA512

          1aeb9db1926d7b42d039a98de84647e79ec8f8925d3c6be5ed3c122d1fb10611d1b23da6f91d05b1853d5af06a3a4f9a159b4cbe438fd27e2c14a488cdfa380e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          e07b415b75640d1b93f4b95c69de2687

          SHA1

          cbd5879c154547eaa85419499e05f95976149e6a

          SHA256

          5d4d2e0306ce6c980098107aaff990d34995c619c1f1b969935866bfa5e242c6

          SHA512

          25a1f094d5c5e67c5db2b3cfddb6f1282c9522d2eea1a24ed4c340a879c1201c9f26653ca9cc37f735ce2b48f12d119d01612f3e3b77552eed67337ff6659107

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2a1c72ae69bf732f03f08cd8f28b5892

          SHA1

          d39634360dac71f124bed2a1e7ff9852f447e53b

          SHA256

          06b926c0dc41fa10c6a7e5ec1c742263bffba39ca2f3a8298c3c0f4a9a0de622

          SHA512

          7433221349108a472909d47f3e3b07240e365165624ea1cc4b1ed7361448675df0bd7371c1718c9f63e106305111e6ae96104b6c1bb99d9a6f849b12f2b04309

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          12da049d8a0b6d4155ecf0af9ff8c400

          SHA1

          15ccb6cafdc09f42cf4ea1b38f000dc1a0e5a3ee

          SHA256

          503d38531a218e363ee180ac89d106dea7236e69ec88c03ca2a6faed6a644cf2

          SHA512

          53b75fb6e8e9b8f5def0c2b926863fd5fa65010b8edc90fbf17acc044c5621ce2ec971f002211087c75c6466252c74e2effa92d2baac65977d6a31ca338c6757

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8b8b0a16265c237d6cf5a1c7374dc74a

          SHA1

          448bab100a6db00ccc6681c06b1a6222ba44ca63

          SHA256

          231014c2cfe0256dadff334265ceeeb2a0cd35aa1c6ff1a13a335456f6b7e1d7

          SHA512

          95d23dd3effd5e9d3343edf6f4f4e8eedeedfdc955f084bff5d260c6e494387102b8ffdf4bd40abd5238dcb705fddae3aaffc1736f6906e31b12ed05d0b8f94c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          d8ddc6bff7677b72dd484a55f2bbe23a

          SHA1

          c497fb86dd2aeaeab06a5f6b533e599c4259b43a

          SHA256

          d0e1f78cc03ebf44000c8ffea85ea2a6c94815c6dda6c036ab4406a5cbbe60da

          SHA512

          30c03ed10b673e765a35d9d5bef0f86a1b079d319a64cf20d83837026fc43b149a5b4d5136564a553c92bb0e36a8d97e34caa7ba652942d96fdd4e28e2f12651

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          8325d1df1c94000b747b201ba8aeff17

          SHA1

          d9acff201e9952c5525240133345f7cef7f79fe0

          SHA256

          115011dd7b4b76270c607c50c532eec6c579d345ed1ee67a178ecf9e4c55b4bb

          SHA512

          7facfa034acb85ef82b7981bedb1c631db352d7f5288a3ecf2e1f5a1d4cf525434451f64ad947ed0003cdd567dba7bd4ee566a93f61200fc1097954aaaa18d2b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f4d6548bfc2d6f0f2f110070fae8a12d

          SHA1

          aab533b65be7ddcdde1a50318ff05175bfca8b15

          SHA256

          710d4b15ed67f8a03ee08eb2b2c26db4d361bc1c380795e9a13dd5da1d5b86b8

          SHA512

          ec1cefaa49147904964560f1c30deef0cc0b8a4901a37c6967afe274bc78f892339f13418896ddb4fc1f66f0aca8207e1fec36e68126a91344d4b821f11fb0c3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          54dea612fc6a7319047d2c13f4af1712

          SHA1

          827480853f962792586c1b22cf359cb1c2bdc9a5

          SHA256

          98eaef5ace806a56e369c2d5c03c6f780802e9a75332ab088722388433412068

          SHA512

          00c1bc2bddc8926b6c40414ad47cc55dacf4885d7fb54f169e8e50ee19bf40861df9cdbc84d9d5c6adfa6537055808e40fc041a3e7013449beb1b7b5596642e8

        • C:\Users\Admin\AppData\Local\Temp\Cab57C4.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar599F.tmp

          Filesize

          175KB

          MD5

          dd73cead4b93366cf3465c8cd32e2796

          SHA1

          74546226dfe9ceb8184651e920d1dbfb432b314e

          SHA256

          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

          SHA512

          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

        • C:\newsetup.vbs

          Filesize

          651B

          MD5

          4736e7158c27f244482f5a614b9dbdae

          SHA1

          d3a0e95a81e9e3ec95cfd596b25749a0e24e27b9

          SHA256

          b8229bc8d6b0013858fb9599cb510afa4566a439164b2c7444c449540a124acc

          SHA512

          cebf895dd3ec3822c42b78bac49c685b063cb5afcbcfb3850b073cb118d086c5fa75ec50b6e73d90e14f2c6b595752ad87910b8cf27378424d72a9ea309bf824

        • \Users\Admin\AppData\Local\Temp\nbfile0.exe

          Filesize

          467KB

          MD5

          74869a0346ab36bbba85022612505121

          SHA1

          2cd02f46f2f9f46eaf15fce40a3bf4781f80cf8a

          SHA256

          6de866b5c8abb1db9b2be231b365c1aa029118fbc58823f443f00e3a33dff18a

          SHA512

          723812083113cff82aa5e2243759c572518865e351cc81b7c2b85a05557862dbbd7a98b964ff6f3aa3802bb5d4dab01a14147211495fc5803d9ddb7b715f4de5

        • \Users\Admin\AppData\Local\Temp\nbfile1.exe

          Filesize

          52KB

          MD5

          c4ddf11ebdbf9d8397d710d2cb4e2fab

          SHA1

          8008c97e7d6ff92deb3e1755a614f4afedca92b9

          SHA256

          67a632049e45c25de35b533659624ca24f8e70447abca015bf5776ce6cb3ded6

          SHA512

          3c9be7b92208e8c0f57ab8048108714e06b2aa896a479f61637a93a9eacb4818fcb25ce3d4e1a24086558daeae65d4b482b2c1cfba3df202c396e2bc218362e9

        • memory/2044-9-0x0000000000340000-0x00000000003CA000-memory.dmp

          Filesize

          552KB

        • memory/2044-8-0x0000000000340000-0x00000000003CA000-memory.dmp

          Filesize

          552KB

        • memory/2044-28-0x0000000000400000-0x0000000000497000-memory.dmp

          Filesize

          604KB

        • memory/2956-12-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/2956-13-0x0000000000020000-0x0000000000022000-memory.dmp

          Filesize

          8KB

        • memory/2956-15-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB