Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 23:18

General

  • Target

    d75385841ba84180116304a6502b2cfb.exe

  • Size

    686KB

  • MD5

    d75385841ba84180116304a6502b2cfb

  • SHA1

    0e161d341fce830894d6332192805c5e1ad817e7

  • SHA256

    4b066e6f81bdb021faaf9e81e9b1e8123b2fc8379843013b26a2e5efed26424c

  • SHA512

    54dcdea62c09bc9d19c964883eac79d3f127df97f775cef003ea8858be2a163fde65c70d6c791dddf7614cf3e20c5b430b02c84a45361fc1b7e16edd476fbb5c

  • SSDEEP

    12288:fvaoCaey4G1UQlVFDQqIvsV1X1tolMeihq7fSk3kdcbCa:fvaoeG1UQa8Lp030cbp

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 4 IoCs
  • Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d75385841ba84180116304a6502b2cfb.exe
    "C:\Users\Admin\AppData\Local\Temp\d75385841ba84180116304a6502b2cfb.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Program Files (x86)\Dzsevzezr.exe
      "C:\Program Files (x86)\Dzsevzezr.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies Internet Explorer Automatic Crash Recovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2484
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""c:\d75385841ba84180116304a6502b2cfb.exe_And xMe.bat""
      2⤵
      • Deletes itself
      PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Dzsevzezr.exe

    Filesize

    12.5MB

    MD5

    f61b3a3bd7b0093cb2eba757865023ad

    SHA1

    4f80d5251450abc25061d76ef2d425ce24d85eca

    SHA256

    40836955524a644e53046f4ff66d889e8eeebb7d37791cfd38cd1a5c9cf75f7e

    SHA512

    aa773323b5ec0e522a5e7906caaea6cb169727c84c38fc79a235bc7e688a15b18dd82b646145b8cedda11d01354350107c738ee488ce64b54d848126b093d9d5

  • C:\Program Files (x86)\Dzsevzezr.exe

    Filesize

    11.7MB

    MD5

    fed911c89a95c358dc246ba29029521d

    SHA1

    2e5b4c4e9a5bbc1ec1752b6db01026dd58f89707

    SHA256

    7acca753976a2df8a4c00b5d4acdc01c6918f66b5d42799f037b48a0b9cc6808

    SHA512

    9f1fa641ab23c2677c4663384180149cf051934f6688fac98fae7804652d1cc37fc44ad463961b4cb7c1d1eae6d7ee18d595f0b104ac5f38515c145651bad4bd

  • C:\Program Files (x86)\Dzsevzezr.exe

    Filesize

    13.6MB

    MD5

    c400e9f580d97fccdba3921448f158cb

    SHA1

    1ff0118f7ff91437ae64e388f33e3bbb4add9a4b

    SHA256

    f9c2b041bf08a9e3e4263d80f8ebf369c4cb9db0f2075caa711e0e503258d3f1

    SHA512

    8f5731ce1f01811e7394659d45ecd5afb427b70a5854d87b7d380b459428e869bae84e4688b245cc7ada1a58a6b6f9488cb80932cd6fa078075b14294b85fe25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f263e12468bea18b27cae74657824c0

    SHA1

    c2e4323916b816044d963dfb3d3e604373f212e7

    SHA256

    312effbd632887f58ec66d9d045505ec6d3c6748397ff1e795359401f90abded

    SHA512

    539fe31e47a301327a435a37cbd7ecb66a49a1ffa948f670b4cb09b0782cee6fb1f6be4e79fda442692db48ab6c57768b3ebd2a541e50b97a37434421ec00cf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    546688bf2116f7fb0e90b8c0d7ed8165

    SHA1

    651e2eed28c5c9022859da6b71bc4b2ae6c3df6c

    SHA256

    d2397a88e0a7946028fdc44915b8b6c347ec9d2eb363242ef627e36f00fe92ed

    SHA512

    90d01e406d73f072a9af8944629562b17298b9ad623c207579e18dfb9926ac53994ab11115f8a750c6bf285760228f87ca5ad93304fa46df3a9210863988e3e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    956fad729d16a5d7ecf480a6b38feeeb

    SHA1

    418df7a1bc9e88a047fd843d443919baaad36727

    SHA256

    c14c7214212ad654ce0a018b532b246562d5583416bcb11417d001a36f19de25

    SHA512

    6f6508614dfbb119331baf929395698a909df3bcf5d0f0eec2e9a6d9b7fa24960cfe95414f6c2c5817042ee22ce9052bbb6b0f50711d2a436ee459d62ed65d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e252788221ea4782451f37cba9cc6b3

    SHA1

    d0e962e5fc9e4be8a8c98d61541c01b006347c50

    SHA256

    46754bd02595409beb205d39f239389ff7686e3c4cc5277d26997ac3c3f94acd

    SHA512

    0d968f158829490206328fd67d201dbd581d957aa6d729ff0cea9602e55ba7fee355dc8aba9ffe3c6a6d17c8045b879ee8c2f109c9c48c1664b1d73cdc20bac8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c9234f749f0b2c34deea029938787e4

    SHA1

    2cd1176f95cc5cf2c8ddc813967cfb86484b9511

    SHA256

    4bfe3fc39362cc478fb35c2e2fc03f08227d911cf4653ba8b5c0920c0fac017f

    SHA512

    a63eddc2f35642b93ea4d8ad57d460eab620cb415ef75ede016cbad91c52f4c71e31110c86a0867b423e97349ae890ee98496d7519f8d29531a9ea304ce709b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dda3046fbae91f3a83b7b0952f7aa29b

    SHA1

    e0f9cbba9a81df45c161fce6bb0cb37c5ebbc53f

    SHA256

    3e802a13c207772b4ca8f9d5723262b47de9dc84f1d85c1a90700eb33e63acbb

    SHA512

    3571aa3636313f8451626063e7e0044db25dc91a6f7ee60fdd31c7ef2adb45627c6f4f6e53b54bebc284785ac6e380f301b7fe1146c35ebced0b93e48bd053f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    012c59ca39ddea711dab9a33e92cb46c

    SHA1

    e2344102a87ff2dbce435561c6c565b3c2f5f232

    SHA256

    72e81af2dc09a6829f3fc9f582496a207153a938c189f1e178de8dc58c63e21b

    SHA512

    7b5597985f3630dd93fe8968bfafb30136f23acab3b9d9151c0e4bacc2a071643f2ca9dbe1f08e7fbc3ca951e97da2f13d9f439118ecd535210e1695087a699f

  • C:\Users\Admin\AppData\Local\Temp\Cab3008.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\E_4\Exmlrpc.fne

    Filesize

    72KB

    MD5

    f79ee77a4f30401507e6f54a61598f58

    SHA1

    7f3ef4945f621ed2880ff5a10a126957b2011a17

    SHA256

    cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8

    SHA512

    26ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739

  • C:\Users\Admin\AppData\Local\Temp\E_4\dp1.fne

    Filesize

    112KB

    MD5

    6d4b2e73f6f8ecff02f19f7e8ef9a8c7

    SHA1

    09c32ca167136a17fd69df8c525ea5ffeca6c534

    SHA256

    fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040

    SHA512

    2fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04

  • C:\Users\Admin\AppData\Local\Temp\Tar3CFB.tmp

    Filesize

    89KB

    MD5

    df91efb08e7ef413f4e4591a785acef7

    SHA1

    aeb94c0f3714901c5a0a69a08ffb91c11a0c7ea9

    SHA256

    0df0bfe7f379777a709f12ef1409662c56b9682daa2cd70434e8483d170ab497

    SHA512

    a3b18e3c4e892cbe04221b2a772ecb1c5f9df6677ef2744340f1425da395211351e9464a1943172651e5fcb4e04e58c6cffc8485195ec2c6203fc00da6ed61ee

  • C:\d75385841ba84180116304a6502b2cfb.exe_And xMe.bat

    Filesize

    182B

    MD5

    81f6bbb182df4ddb1193a3c0885f0b24

    SHA1

    2725fe220a412a68dbe7220a6002c4394c69e709

    SHA256

    1c96d3b1acf54a5e3de429229c755f3888de85cf961e882513304cf5c6bc9355

    SHA512

    f6bdb629163d5e28e0e2ee4b3100fc9e3dfe82e8d56ce1e77526c5aa0a8f80d3cb4d8485a22e2c3aee7a8a7fb8d60f116fc096f2d2599d026d5f99af60c8f519

  • \Program Files (x86)\Dzsevzezr.exe

    Filesize

    8.6MB

    MD5

    5998c68bde146b90d36efb74864bebfb

    SHA1

    609cd832111262c634e0ad14751f44e8aaade130

    SHA256

    57feee1d7dbd7877689e67d85e123588e4111771eaca4d35f25a894867e7e2f6

    SHA512

    96afeb6d949a053b9c58ec10b9e63a6d1b87787183534cead0fd183c4fb7879181b8a6ed47dcf34aa02b29e9bcaa4c9bd5bda9edf746bb88b7850a78bb2e6de6

  • \Program Files (x86)\Dzsevzezr.exe

    Filesize

    13.3MB

    MD5

    fc4c5776ad523973f7b2f721cf5a1ee2

    SHA1

    739b8be56330b92f5061665ac2dde6d1296d90e4

    SHA256

    4cbca24f24e3fe58cb5460abe93788efee53d8db8d0ff3d7c2d3112aac5e6fbc

    SHA512

    acb9fee218eca8ab75a88645a8cc29c59e21251981f5f305f8778e7aaa07d3a828970fb2e655ef31db1dfe51adaf8c37aaeac603cb0e4d2dee90e4f902dcb88a

  • \Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

    Filesize

    409KB

    MD5

    c3d354bdf277263b13dca264ec2add9d

    SHA1

    b428dfd7df0f6024e22838823cc702e2293bd314

    SHA256

    ede1e15bb21655495ea3b3fb6710390d53839abeed944ed7ab1af7403b50aa5f

    SHA512

    24c8e96b3c07fa4e44fbb31a4e09bea728d90d410352aa9c6b6b6165ff5c038f689b7b58b05abc6513fa4ab953b78edc0f9e8298b2d57fe1c26e80068e7ca68e

  • memory/2080-25-0x0000000001E30000-0x0000000001E60000-memory.dmp

    Filesize

    192KB

  • memory/2080-45-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2080-44-0x0000000010000000-0x0000000010129000-memory.dmp

    Filesize

    1.2MB

  • memory/2080-36-0x00000000006C0000-0x00000000006DE000-memory.dmp

    Filesize

    120KB

  • memory/2080-17-0x0000000001E30000-0x0000000001E60000-memory.dmp

    Filesize

    192KB

  • memory/2080-3-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2080-6-0x0000000010000000-0x0000000010129000-memory.dmp

    Filesize

    1.2MB

  • memory/2872-53-0x0000000010000000-0x0000000010129000-memory.dmp

    Filesize

    1.2MB

  • memory/2872-29-0x0000000000840000-0x000000000085E000-memory.dmp

    Filesize

    120KB

  • memory/2872-27-0x0000000010000000-0x0000000010129000-memory.dmp

    Filesize

    1.2MB

  • memory/2872-26-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB