Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/03/2024, 23:50

240323-3vttmsed88 10

12/12/2020, 10:26

201212-wddwj75xse 10

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/03/2024, 23:50

General

  • Target

    301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.exe

  • Size

    413KB

  • MD5

    3023d7526b479ea3df315a5b1779a43d

  • SHA1

    b5ae71b96a28b9353a4f33c5370ac18750937c17

  • SHA256

    301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f

  • SHA512

    67fe1cf7538e8ef76b6acbba99326af0de58464bf5710ae6fa7b85d73da9a84c58122de6b87c7d9560f0d366de711a95d03be231c1018eacb7489fd32aeb0834

  • SSDEEP

    6144:OpZsqlbu151gFomsCfv6hdgnkG6FSXrIiucY6/4sTj3GUcqcPVpNghCQ:Ussu15qlsmShRG6mIiucN42qxqcC

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies security service 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\System32\smss.exe
    \SystemRoot\System32\smss.exe
    1⤵
    • Suspicious use of UnmapMainImage
    PID:260
  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:336
  • C:\Windows\system32\wininit.exe
    wininit.exe
    1⤵
      PID:364
      • C:\Windows\system32\services.exe
        C:\Windows\system32\services.exe
        2⤵
          PID:468
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:604
            • C:\Windows\system32\wbem\wmiprvse.exe
              C:\Windows\system32\wbem\wmiprvse.exe -Embedding
              4⤵
                PID:888
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k RPCSS
              3⤵
                PID:680
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                3⤵
                • Modifies security service
                PID:764
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                3⤵
                  PID:824
                  • C:\Windows\system32\Dwm.exe
                    "C:\Windows\system32\Dwm.exe"
                    4⤵
                      PID:1188
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs
                    3⤵
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:864
                    • C:\Windows\system32\wbem\WMIADAP.EXE
                      wmiadap.exe /F /T /R
                      4⤵
                        PID:2796
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService
                      3⤵
                        PID:1012
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k NetworkService
                        3⤵
                          PID:340
                        • C:\Windows\System32\spoolsv.exe
                          C:\Windows\System32\spoolsv.exe
                          3⤵
                            PID:1040
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                            3⤵
                              PID:1092
                            • C:\Windows\system32\taskhost.exe
                              "taskhost.exe"
                              3⤵
                                PID:1124
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                3⤵
                                  PID:2148
                                • C:\Windows\system32\sppsvc.exe
                                  C:\Windows\system32\sppsvc.exe
                                  3⤵
                                    PID:2892
                                • C:\Windows\system32\lsass.exe
                                  C:\Windows\system32\lsass.exe
                                  2⤵
                                    PID:484
                                  • C:\Windows\system32\lsm.exe
                                    C:\Windows\system32\lsm.exe
                                    2⤵
                                      PID:492
                                  • C:\Windows\system32\csrss.exe
                                    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                                    1⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:388
                                    • C:\Windows\system32\conhost.exe
                                      \??\C:\Windows\system32\conhost.exe "-9969084541825130179-1056484498-946034262056648482-11613342356049442023202509"
                                      2⤵
                                        PID:700
                                    • C:\Windows\system32\winlogon.exe
                                      winlogon.exe
                                      1⤵
                                        PID:432
                                      • C:\Users\Admin\AppData\Local\Temp\301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.exe
                                        "C:\Users\Admin\AppData\Local\Temp\301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.exe"
                                        1⤵
                                        • Modifies WinLogon for persistence
                                        • Adds Run key to start application
                                        • Suspicious behavior: MapViewOfSection
                                        • Suspicious use of WriteProcessMemory
                                        PID:2752
                                        • C:\Windows\syswow64\svchost.exe
                                          C:\Windows\syswow64\svchost.exe
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of WriteProcessMemory
                                          PID:2596
                                          • C:\Windows\syswow64\svchost.exe
                                            C:\Windows\syswow64\svchost.exe
                                            3⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of WriteProcessMemory
                                            PID:2532
                                        • C:\Windows\syswow64\svchost.exe
                                          C:\Windows\syswow64\svchost.exe
                                          2⤵
                                            PID:1784
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c ""C:\Users\Admin\AppData\Local\Temp\Xjl5h8mE4As5vJ.bat" 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.exe"
                                            2⤵
                                            • Deletes itself
                                            • Suspicious use of WriteProcessMemory
                                            PID:2252
                                            • C:\Windows\SysWOW64\attrib.exe
                                              attrib -r -s -h 301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.bin.exe
                                              3⤵
                                              • Views/modifies file attributes
                                              PID:1928
                                        • C:\Windows\system32\taskmgr.exe
                                          "C:\Windows\system32\taskmgr.exe" /4
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          PID:1420

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\ProgramData\bijms\nahngot.exe

                                          Filesize

                                          413KB

                                          MD5

                                          3023d7526b479ea3df315a5b1779a43d

                                          SHA1

                                          b5ae71b96a28b9353a4f33c5370ac18750937c17

                                          SHA256

                                          301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f

                                          SHA512

                                          67fe1cf7538e8ef76b6acbba99326af0de58464bf5710ae6fa7b85d73da9a84c58122de6b87c7d9560f0d366de711a95d03be231c1018eacb7489fd32aeb0834

                                        • C:\ProgramData\cxg\wscpt.flx

                                          Filesize

                                          417KB

                                          MD5

                                          e00524afdf6afa0445769d0a963cd80d

                                          SHA1

                                          b093fa0ccde2a7c65d6723fd0d1e0eae17fcdf51

                                          SHA256

                                          182b4438405bd550085c48d4bd5c09f4b884113c92278bc48b6d47bb1d7c1c1f

                                          SHA512

                                          d6af78a7776d681fe83f37968d57e063ac9f17d4b8d8115e35b1d532cdedd33707a6092c39b7e5a8d68e9d361597c8a0c224c2ab7139ed5958e4ff1446a14ec9

                                        • C:\ProgramData\llirjg\iwurns.uyn

                                          Filesize

                                          9KB

                                          MD5

                                          50248170d0f755c5a311b61a59181ad9

                                          SHA1

                                          93486b1a90b7c802ccdccc88c27abac5076c5ef2

                                          SHA256

                                          acba531431c5043991a7335011169ccd0025632f78e3925216fdf68edb4a8dca

                                          SHA512

                                          cd3d5a511ccdc2e9e95cacb6c7dce02e71afe6eb6ccd32da29f00894da945f51b3eb5c1acdae9b7b1007bc13754dc6fb71f343d8a0c9a8bfca8ba7db773f4d85

                                        • C:\Users\Admin\AppData\Local\Temp\Xjl5h8mE4As5vJ.bat

                                          Filesize

                                          74B

                                          MD5

                                          f488b5df4ab36b2fa1c78c041f5a433c

                                          SHA1

                                          fe8b77ce17a48de7d7e6f7bfe7b8411701ebb12f

                                          SHA256

                                          ce0e7dceca9e877c8ad232acef340c246f6f553e841dbcff18a9b458cd0fae1c

                                          SHA512

                                          3df780bf8f3c2b547606f2dfc5552ab5140fdb089681f5945d2aec23d3eeb13d1546ea100881d6c830110c79c60f113788b1fbc7fd674a3578f9e2f76ea54ea7

                                        • C:\Users\Admin\AppData\Local\Temp\dxxwfol.tzg

                                          Filesize

                                          249B

                                          MD5

                                          68e031d1729db228c9a448f15cb30583

                                          SHA1

                                          7d5b0c77ea1f3b059bfd425f97dc7d780ab7c9d9

                                          SHA256

                                          9800cc7f1278e69bceb1ca127bb12d5e45fc9ed104ec0d0eeaf958811bee94e9

                                          SHA512

                                          1b77cfed131744b1d7c5f52135806a201ca6c9f2669c0aaa3582dff1094716b6b8e63355a86aa4506fe2b72ca22e0d43df327a72f49bad12d5a46eb0325fa780

                                        • memory/260-55-0x0000000000110000-0x0000000000160000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/260-64-0x0000000000110000-0x0000000000160000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/260-60-0x0000000000110000-0x0000000000160000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/336-121-0x0000000000200000-0x0000000000201000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/336-66-0x0000000000A70000-0x0000000000AC0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/336-67-0x0000000000A70000-0x0000000000AC0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/340-176-0x00000000009B0000-0x0000000000A00000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/364-91-0x00000000007A0000-0x00000000007F0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/388-110-0x0000000000AC0000-0x0000000000AD0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/388-99-0x0000000001FC0000-0x0000000002010000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/432-106-0x0000000000830000-0x0000000000880000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/468-111-0x0000000000C90000-0x0000000000CE0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/484-118-0x0000000000230000-0x0000000000280000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/492-123-0x0000000000860000-0x00000000008B0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/604-128-0x00000000003B0000-0x0000000000400000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/680-131-0x00000000003E0000-0x0000000000430000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/764-133-0x0000000000880000-0x00000000008D0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/824-139-0x0000000000890000-0x00000000008E0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/864-142-0x0000000000E90000-0x0000000000EE0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/1012-152-0x0000000000110000-0x0000000000160000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/1040-179-0x0000000001C00000-0x0000000001C50000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/1092-166-0x0000000000200000-0x0000000000201000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/1092-182-0x0000000000990000-0x00000000009E0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/1124-171-0x0000000000360000-0x0000000000362000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/1124-183-0x0000000001C80000-0x0000000001CD0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/1188-186-0x0000000000380000-0x00000000003D0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/1784-88-0x0000000000080000-0x00000000000BF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/1784-100-0x0000000000220000-0x000000000022F000-memory.dmp

                                          Filesize

                                          60KB

                                        • memory/1784-92-0x0000000000080000-0x00000000000BF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/1784-125-0x0000000000260000-0x0000000000270000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/1784-71-0x0000000000080000-0x00000000000BF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2148-187-0x00000000003E0000-0x00000000003E2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2148-188-0x0000000000190000-0x00000000001E0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/2532-185-0x0000000001C80000-0x0000000001CD0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/2532-146-0x0000000000080000-0x00000000000BF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2532-58-0x00000000001E0000-0x00000000001E2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2532-62-0x0000000000200000-0x0000000000201000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2532-162-0x0000000000110000-0x0000000000160000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/2532-61-0x0000000000210000-0x0000000000211000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2532-56-0x00000000001D0000-0x00000000001DF000-memory.dmp

                                          Filesize

                                          60KB

                                        • memory/2532-54-0x0000000000180000-0x00000000001BF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2532-154-0x00000000001E0000-0x00000000001E2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2532-169-0x0000000000200000-0x0000000000201000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2532-148-0x0000000000E90000-0x0000000000EE0000-memory.dmp

                                          Filesize

                                          320KB

                                        • memory/2532-144-0x0000000000080000-0x00000000000BF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2532-175-0x0000000000360000-0x0000000000362000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2532-48-0x0000000000080000-0x00000000000BF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2532-47-0x0000000000080000-0x00000000000BF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2532-46-0x0000000000080000-0x00000000000BF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2532-40-0x0000000000890000-0x0000000000898000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2532-44-0x0000000000890000-0x0000000000898000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2596-35-0x00000000001A0000-0x00000000001A1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2596-29-0x0000000000890000-0x0000000000898000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2596-36-0x0000000000190000-0x0000000000191000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2596-41-0x0000000000290000-0x0000000000291000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2596-43-0x0000000000290000-0x0000000000291000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2596-45-0x0000000000290000-0x0000000000291000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2596-112-0x00000000000C0000-0x00000000000FF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2596-37-0x0000000000290000-0x0000000000298000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2596-34-0x0000000000030000-0x0000000000031000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2596-33-0x00000000000C0000-0x00000000000FF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2596-102-0x0000000000290000-0x00000000002A0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2596-95-0x0000000000260000-0x0000000000270000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2596-32-0x00000000000C0000-0x00000000000FF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2596-31-0x00000000000C0000-0x00000000000FF000-memory.dmp

                                          Filesize

                                          252KB

                                        • memory/2596-30-0x0000000000890000-0x0000000000898000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2596-135-0x0000000000290000-0x0000000000298000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2596-98-0x0000000000270000-0x000000000027E000-memory.dmp

                                          Filesize

                                          56KB

                                        • memory/2596-140-0x00000000001B0000-0x00000000001B1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2596-89-0x0000000000260000-0x0000000000270000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2752-8-0x0000000000170000-0x0000000000171000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-39-0x00000000000F0000-0x0000000000130000-memory.dmp

                                          Filesize

                                          256KB

                                        • memory/2752-0-0x00000000000F0000-0x0000000000130000-memory.dmp

                                          Filesize

                                          256KB

                                        • memory/2752-7-0x00000000000F0000-0x0000000000130000-memory.dmp

                                          Filesize

                                          256KB

                                        • memory/2752-9-0x0000000000170000-0x0000000000171000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-10-0x0000000000170000-0x0000000000171000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-59-0x0000000000180000-0x0000000000181000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-12-0x0000000000170000-0x0000000000171000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-52-0x0000000000170000-0x0000000000171000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-97-0x00000000000F0000-0x0000000000130000-memory.dmp

                                          Filesize

                                          256KB

                                        • memory/2752-5-0x00000000000F0000-0x0000000000130000-memory.dmp

                                          Filesize

                                          256KB

                                        • memory/2752-49-0x0000000000170000-0x0000000000171000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-51-0x0000000000170000-0x0000000000171000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-50-0x0000000000170000-0x0000000000171000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-21-0x0000000000180000-0x0000000000181000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-17-0x0000000000170000-0x0000000000171000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-16-0x0000000000150000-0x0000000000151000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-24-0x0000000000140000-0x0000000000141000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2752-1-0x0000000000650000-0x00000000006A8000-memory.dmp

                                          Filesize

                                          352KB