Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
cd3e2e5db407027a2e220895e56cea9d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd3e2e5db407027a2e220895e56cea9d.exe
Resource
win10v2004-20240226-en
General
-
Target
cd3e2e5db407027a2e220895e56cea9d.exe
-
Size
1.2MB
-
MD5
cd3e2e5db407027a2e220895e56cea9d
-
SHA1
9b7f73950140ffe44faf303d9f939ffe0e831ca1
-
SHA256
9c9043fc217ad2dffc662e74354280936d9295735ee186db5912ee43db62c8fc
-
SHA512
cb13555db384feaf62c64840d368147f37dc2227f2161782cfaa39a4ab08b2bd910e8ce07ac0f5b4e35ebe8d50ab1c10add111d1a08fb2a17e9cc06a4f25566b
-
SSDEEP
24576:vXSdS7fpASLVbL/9qPmlNqfsOFxibcN0VsNHxz6K6m4:PSd+fqebLwPoJmfNJT2/m4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2776 KGH.exe -
Loads dropped DLL 2 IoCs
pid Process 2720 cd3e2e5db407027a2e220895e56cea9d.exe 2776 KGH.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\KGH Start = "C:\\Windows\\SysWOW64\\CFAAQI\\KGH.exe" KGH.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\CFAAQI\KGH.004 cd3e2e5db407027a2e220895e56cea9d.exe File created C:\Windows\SysWOW64\CFAAQI\KGH.001 cd3e2e5db407027a2e220895e56cea9d.exe File created C:\Windows\SysWOW64\CFAAQI\KGH.002 cd3e2e5db407027a2e220895e56cea9d.exe File created C:\Windows\SysWOW64\CFAAQI\AKV.exe cd3e2e5db407027a2e220895e56cea9d.exe File created C:\Windows\SysWOW64\CFAAQI\KGH.exe cd3e2e5db407027a2e220895e56cea9d.exe File opened for modification C:\Windows\SysWOW64\CFAAQI\ KGH.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2488 set thread context of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2776 KGH.exe Token: SeIncBasePriorityPrivilege 2776 KGH.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2488 cd3e2e5db407027a2e220895e56cea9d.exe 2776 KGH.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2488 wrote to memory of 2720 2488 cd3e2e5db407027a2e220895e56cea9d.exe 28 PID 2720 wrote to memory of 2776 2720 cd3e2e5db407027a2e220895e56cea9d.exe 29 PID 2720 wrote to memory of 2776 2720 cd3e2e5db407027a2e220895e56cea9d.exe 29 PID 2720 wrote to memory of 2776 2720 cd3e2e5db407027a2e220895e56cea9d.exe 29 PID 2720 wrote to memory of 2776 2720 cd3e2e5db407027a2e220895e56cea9d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd3e2e5db407027a2e220895e56cea9d.exe"C:\Users\Admin\AppData\Local\Temp\cd3e2e5db407027a2e220895e56cea9d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\cd3e2e5db407027a2e220895e56cea9d.exe
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\CFAAQI\KGH.exe"C:\Windows\system32\CFAAQI\KGH.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500KB
MD55a45ea24cce078dcf28664856734565d
SHA17e38e0649eae4b0f382c182d0483d9e4c0be26fa
SHA256385f990c5fb25dc42a5f5a1128c8d20b9956a0790461c62c56607600c8ba7d5a
SHA5127c466effc080db3c082a3a81cd22a1ee039104ebc9588921124490ceab84b2d5c1b1f4f82dfba95114661311276448297946296b2c4ad9d55cee2e3b710c12e5
-
Filesize
69KB
MD5c7fbfdd2d7ded71b4b6281efa26eeede
SHA1f2f31ff2fab0c96ce978543ec741c6c82dfb7dbc
SHA256f06fc708de125585f9bfb0c768e1d76f24b6e888875aafdc8c2b670663492737
SHA512768cd3f899c7d68b426a5bcb5befd4570032ded9a40ceb0cbde618c23016c59e32b03b6b6963b207f7e58621fca2e3ea6d144c1457f69a0b9ef94ed03e83d041
-
Filesize
54KB
MD5e7879e2f301a885bb46ec1782a6d6278
SHA11aa00ac15c7748432b448be0f8a0d760222024bd
SHA2569a65b644da2a50ebebaab51c46e8748587d08aaad64102c3df19d996d12dfcef
SHA5127aa02f3bc0e87ea1afb0b42664891e5198b38796b3fac0deaeff0e92c59892b8a5b985e5d834c713868818a1be6f82cebabab1ac79a286f88c1d57452143a8ed
-
Filesize
1KB
MD59cdba6e525eeadada6af06e4ab9ec298
SHA1ccf4ffcdc78831eb7b6496f231aa5ec1aa1b8322
SHA2564ed9987cae8b95355a54056363e14c2bd2d7c5717cceb6a23dd9061cf53ba776
SHA51294f7519f5c34cc7bdd3a1d55b050a8dffefffaad018deb4aa955569bbdfd8922425aa6dc60db50d0e0235e0e9296a9d2d20e94be02b5a374219f088e04608b91
-
Filesize
1.7MB
MD5e4bb483573e6bc82f09578f0b48324a5
SHA19a60cf20d832af49fb8ae6c484d0f39028d93d04
SHA25630b3f04eb8b0820b33c8bc50c159ade06a4a29e4361f917b13bdd9323f4a3127
SHA5128461aefddde57e467601928789f301c0c5bc42e7c7e4aaaf2dcb7ac6a2aea0d5be51db3daf6c9b11f1d78304de72ae8cf71dd8697d636db4f1767a8f8c6ab35b