Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2024, 15:00

General

  • Target

    de48fbfd909d2c24ccacc2e65a4f9a8e.exe

  • Size

    484KB

  • MD5

    de48fbfd909d2c24ccacc2e65a4f9a8e

  • SHA1

    741d46975981f5785d0c930113c21c996fc54f18

  • SHA256

    73b398cd11d22cbdee1b5ccab59849f5ab3114d26c0020548cf278465a88b963

  • SHA512

    869ead029cb4b001a750acaa728b28e9a23d6db2169b22dfe579f62c4086d852f2f956b52dc6fe895377dc7a911de6f35c7cd43e98bd10f316cb8c52bf3f03b4

  • SSDEEP

    12288:5ezW4GCJSzsY14+fmw1uF1GSKiZq0iDRtFUBSZtON0aRz6mHG:5kqW0wzdH

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de48fbfd909d2c24ccacc2e65a4f9a8e.exe
    "C:\Users\Admin\AppData\Local\Temp\de48fbfd909d2c24ccacc2e65a4f9a8e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c \stop.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Windows\SysWOW64\net.exe
        net stop sharedaccess
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2136
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop sharedaccess
          4⤵
            PID:4352
        • C:\Windows\SysWOW64\net.exe
          net stop alerter
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3064
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop alerter
            4⤵
              PID:4620
          • C:\Windows\SysWOW64\net.exe
            net stop vsmon
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3048
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop vsmon
              4⤵
                PID:2456
            • C:\Windows\SysWOW64\net.exe
              net stop minilog
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3912
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop minilog
                4⤵
                  PID:2620
              • C:\Windows\SysWOW64\net.exe
                net stop BlackICE
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1828
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop BlackICE
                  4⤵
                    PID:2932
                • C:\Windows\SysWOW64\net.exe
                  net stop SVW3
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4408
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop SVW3
                    4⤵
                      PID:2356
                  • C:\Windows\SysWOW64\net.exe
                    net stop NISUM
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3212
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop NISUM
                      4⤵
                        PID:860
                    • C:\Windows\SysWOW64\net.exe
                      net stop NISSERV
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1420
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop NISSERV
                        4⤵
                          PID:4500
                      • C:\Windows\SysWOW64\net.exe
                        net stop NVSVC32
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4048
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop NVSVC32
                          4⤵
                            PID:5032
                        • C:\Windows\SysWOW64\net.exe
                          net stop NAVAP
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3884
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop NAVAP
                            4⤵
                              PID:2044
                          • C:\Windows\SysWOW64\net.exe
                            net stop NAVENG
                            3⤵
                              PID:3436
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop NAVENG
                                4⤵
                                  PID:2544
                              • C:\Windows\SysWOW64\net.exe
                                net stop NAVEX15
                                3⤵
                                  PID:1908
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop NAVEX15
                                    4⤵
                                      PID:636
                                  • C:\Windows\SysWOW64\net.exe
                                    net stop NAV
                                    3⤵
                                      PID:1712
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 stop NAV
                                        4⤵
                                          PID:3348
                                      • C:\Windows\SysWOW64\net.exe
                                        net stop Auto-Protect
                                        3⤵
                                          PID:4732
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 stop Auto-Protect
                                            4⤵
                                              PID:5064
                                          • C:\Windows\SysWOW64\net.exe
                                            net stop AvgServ
                                            3⤵
                                              PID:3776
                                              • C:\Windows\SysWOW64\net1.exe
                                                C:\Windows\system32\net1 stop AvgServ
                                                4⤵
                                                  PID:4376
                                              • C:\Windows\SysWOW64\net.exe
                                                net stop SweepNet
                                                3⤵
                                                  PID:4972
                                                  • C:\Windows\SysWOW64\net1.exe
                                                    C:\Windows\system32\net1 stop SweepNet
                                                    4⤵
                                                      PID:3624
                                                  • C:\Windows\SysWOW64\net.exe
                                                    net stop AvSynMgr
                                                    3⤵
                                                      PID:4344
                                                      • C:\Windows\SysWOW64\net1.exe
                                                        C:\Windows\system32\net1 stop AvSynMgr
                                                        4⤵
                                                          PID:3604
                                                      • C:\Windows\SysWOW64\net.exe
                                                        net stop McShield
                                                        3⤵
                                                          PID:4188
                                                          • C:\Windows\SysWOW64\net1.exe
                                                            C:\Windows\system32\net1 stop McShield
                                                            4⤵
                                                              PID:2056
                                                          • C:\Windows\SysWOW64\net.exe
                                                            net stop SweepNet
                                                            3⤵
                                                              PID:744
                                                              • C:\Windows\SysWOW64\net1.exe
                                                                C:\Windows\system32\net1 stop SweepNet
                                                                4⤵
                                                                  PID:4812
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3936 --field-trial-handle=2256,i,18272763564106695635,11201593968620719822,262144 --variations-seed-version /prefetch:8
                                                            1⤵
                                                              PID:1632

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Windows\SysWOW64\Mswinsck.ocx

                                                              Filesize

                                                              105KB

                                                              MD5

                                                              9484c04258830aa3c2f2a70eb041414c

                                                              SHA1

                                                              b242a4fb0e9dcf14cb51dc36027baff9a79cb823

                                                              SHA256

                                                              bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

                                                              SHA512

                                                              9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

                                                            • C:\stop.bat

                                                              Filesize

                                                              358B

                                                              MD5

                                                              80eca32f297879e7233214ccfa8fd802

                                                              SHA1

                                                              77bf3d64f0d670a034471263ced793a1d6d012d2

                                                              SHA256

                                                              1fb649fc22cebde183d02b48a609ee7e3daa2db047f87a2c7f9d6c9250cf6646

                                                              SHA512

                                                              3b42a3836c538e94bfef4f0ac5c1d1f9cc4e4b776b296d9299ed7bedd78df832c4d4c78a83c02d0815913c53ee4b0bfe3d2cc75b6762fdf3e1afff1a261135f9