Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 20:43

General

  • Target

    7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe

  • Size

    205KB

  • MD5

    3f09dd853dd62d494aef22d8986b1fb5

  • SHA1

    fc57d05184220ee8681fde8eda7da40df38ea82a

  • SHA256

    7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318

  • SHA512

    9b8164af1787938c679ad44d4730a138d531fbd5764b4a0b57961eea468792d2ba7d285cfca027618702353b56de779c0bfdb1bdb1ec00a03df31851b32576d5

  • SSDEEP

    3072:r7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:lzHnMLm5GNGxHUhtnkdpHqTKzhh8i

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 18 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe
    "C:\Users\Admin\AppData\Local\Temp\7799b8a83ebaf56f0ef947a59b9b1a30d887d006aa18e2f65d4c01d169481318.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    993004d9cf74fe8f87359724b52b1bce

    SHA1

    f11faec3fa098e2e6aa86291161dc038309e8beb

    SHA256

    20093162702a602e5657f5477b18b7edd273a01230e40593fa3cb5e45185e568

    SHA512

    08a54c338a535964b3444241674e06d6d8bf6eb7f4a8274ebd4ad91eb5d04fae2fe5d7bbfff1223c673c6791135f03c59af89ebece5ac450fc4b5f0e26b204b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52b24478a5fa268cd7140c4e659cf610

    SHA1

    a5b4a53fdaf824561510f4ed4750cc6afaee6873

    SHA256

    cff7291b481fcea98cde2e98c399dfde55f505a9d019045bbd1a4b73259f82a2

    SHA512

    d72662e88e313cd92974aef03c296a1c5e9c0920eae2a80dd6cd939da9a7f89f6f015eae481e3930a3202f9b1c305be55d7c7e83e748a5ee990028323b423ebc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\login[2].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\Cab3FA1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar41B7.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar4343.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Windows\AppPatch\svchost.exe

    Filesize

    205KB

    MD5

    fed9ddc8f95d6c03f2d7a3788eec247e

    SHA1

    d3ef2567afeb914ad26a0f142a81bfa8b709709e

    SHA256

    5b10d79afdc3c23c6025c51f9c19e210ec696bc0a2a2d8e2cbb8cd6f57428a61

    SHA512

    cbbd6c3e8de85536b1d62e7df95516d1a272e08c0349e2724a77c952bcc47f53f467175c8831566cb41b054b7054eaef4fae5f4bb7c7db7e6dd24161dddd3091

  • memory/2248-18-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2248-16-0x00000000002D0000-0x000000000031F000-memory.dmp

    Filesize

    316KB

  • memory/2248-2-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2248-1-0x00000000002D0000-0x000000000031F000-memory.dmp

    Filesize

    316KB

  • memory/2248-0-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2916-54-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-59-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-28-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2916-30-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2916-33-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-31-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-35-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-37-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-38-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-39-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-40-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-41-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-42-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-43-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-44-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-45-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-46-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-47-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-48-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-49-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-50-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-51-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-52-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-24-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2916-53-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-55-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-56-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-57-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-58-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-26-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2916-60-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-61-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-62-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-63-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-64-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-65-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-66-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-67-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-68-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-69-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-70-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-71-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-72-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-73-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-74-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-76-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-75-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-77-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-78-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-79-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-80-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-81-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-22-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2916-20-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2916-19-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2916-17-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2916-82-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB

  • memory/2916-221-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2916-222-0x0000000001FA0000-0x0000000002052000-memory.dmp

    Filesize

    712KB