Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 14:39

General

  • Target

    df68efb674b30e3c367ba59b823afb29.exe

  • Size

    321KB

  • MD5

    df68efb674b30e3c367ba59b823afb29

  • SHA1

    7408e49181a50cf41a42507f8f9eccc22d7ab799

  • SHA256

    36b190f8fb5a27e417b1bc6c11d5fdca21cd13b8e0fdb027a40d50a39fa5e255

  • SHA512

    e4a027b3eb6f318a194281cd43ce575dc77598cefb8846d14d01d3af914dc9f9cdac0c1439a9199a350d0a9ec7b5fa88dabadb38e4b2449d2b96ae3514ecb554

  • SSDEEP

    6144:2wTTuHg4DQC6ziRo0sYXkvDm5TsCQIaNEN4xxgBuixuqFsE6a7ZR:DopF6K1diUIIaNniBunq+nar

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1224
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1256
          • C:\Users\Admin\AppData\Local\Temp\df68efb674b30e3c367ba59b823afb29.exe
            "C:\Users\Admin\AppData\Local\Temp\df68efb674b30e3c367ba59b823afb29.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2180
            • C:\Users\Admin\AppData\Roaming\Utopej\idkae.exe
              "C:\Users\Admin\AppData\Roaming\Utopej\idkae.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2880
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8fa77cda.bat"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:944
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 112
                4⤵
                • Program crash
                PID:1556
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1652
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "-2016524993106840588312773213151382091468-1684313077-1872060101-738079523787781196"
            1⤵
              PID:1676

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Obpac\awzii.lat

              Filesize

              366B

              MD5

              53390ff578e6afb949af05f86456eede

              SHA1

              cada52f3d5afec049608f944d0b4da10db3769be

              SHA256

              ebcb7255f3ca5145f86419a8965dd5ab01f375c93620b23db1256bff0f635d59

              SHA512

              a23f4ec1f452fe6a98f5900b755933f0a001399986fc2baf4daa8ca8347b080fe83ba2432d3a423cd5506e66fbdab7128409de00933862cf532c129394e6b436

            • \Users\Admin\AppData\Roaming\Utopej\idkae.exe

              Filesize

              321KB

              MD5

              31f595fdceb93d4c7b5b1107f86f2009

              SHA1

              adddfc699e132b9e458ac98e1e4bf5a77f5a1f97

              SHA256

              24fd46cbd4b60b224099b02e9c56aef4f3ae94bd9250ae8b08c637f6dded224c

              SHA512

              47a9086a72aaae6f1bda00b7ba29b0795c41efd3e35cdcd963cad142e90711de393b35e81b22a3c02c1a3e3fecda371fe9b3af0d89080bc4522b1f5e41ffe8ca

            • memory/1120-18-0x0000000002050000-0x0000000002091000-memory.dmp

              Filesize

              260KB

            • memory/1120-21-0x0000000002050000-0x0000000002091000-memory.dmp

              Filesize

              260KB

            • memory/1120-23-0x0000000002050000-0x0000000002091000-memory.dmp

              Filesize

              260KB

            • memory/1120-25-0x0000000002050000-0x0000000002091000-memory.dmp

              Filesize

              260KB

            • memory/1120-27-0x0000000002050000-0x0000000002091000-memory.dmp

              Filesize

              260KB

            • memory/1224-32-0x0000000001F90000-0x0000000001FD1000-memory.dmp

              Filesize

              260KB

            • memory/1224-30-0x0000000001F90000-0x0000000001FD1000-memory.dmp

              Filesize

              260KB

            • memory/1224-33-0x0000000001F90000-0x0000000001FD1000-memory.dmp

              Filesize

              260KB

            • memory/1224-31-0x0000000001F90000-0x0000000001FD1000-memory.dmp

              Filesize

              260KB

            • memory/1256-35-0x0000000002DA0000-0x0000000002DE1000-memory.dmp

              Filesize

              260KB

            • memory/1256-36-0x0000000002DA0000-0x0000000002DE1000-memory.dmp

              Filesize

              260KB

            • memory/1256-37-0x0000000002DA0000-0x0000000002DE1000-memory.dmp

              Filesize

              260KB

            • memory/1256-38-0x0000000002DA0000-0x0000000002DE1000-memory.dmp

              Filesize

              260KB

            • memory/1556-289-0x0000000002520000-0x0000000002561000-memory.dmp

              Filesize

              260KB

            • memory/1556-286-0x0000000000470000-0x0000000000471000-memory.dmp

              Filesize

              4KB

            • memory/1556-282-0x0000000002520000-0x0000000002561000-memory.dmp

              Filesize

              260KB

            • memory/1556-284-0x0000000077690000-0x0000000077691000-memory.dmp

              Filesize

              4KB

            • memory/1652-47-0x0000000002290000-0x00000000022D1000-memory.dmp

              Filesize

              260KB

            • memory/1652-45-0x0000000002290000-0x00000000022D1000-memory.dmp

              Filesize

              260KB

            • memory/1652-41-0x0000000002290000-0x00000000022D1000-memory.dmp

              Filesize

              260KB

            • memory/1652-43-0x0000000002290000-0x00000000022D1000-memory.dmp

              Filesize

              260KB

            • memory/2180-53-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB

            • memory/2180-76-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-51-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB

            • memory/2180-5-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2180-55-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB

            • memory/2180-57-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB

            • memory/2180-59-0x0000000000490000-0x00000000004D1000-memory.dmp

              Filesize

              260KB

            • memory/2180-60-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-62-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-64-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-66-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-68-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-70-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-72-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-74-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-0-0x0000000000270000-0x00000000002B1000-memory.dmp

              Filesize

              260KB

            • memory/2180-79-0x0000000077690000-0x0000000077691000-memory.dmp

              Filesize

              4KB

            • memory/2180-78-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-81-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-152-0x0000000000520000-0x0000000000521000-memory.dmp

              Filesize

              4KB

            • memory/2180-4-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2180-175-0x00000000002C0000-0x0000000000313000-memory.dmp

              Filesize

              332KB

            • memory/2180-176-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2180-3-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2180-2-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2180-1-0x00000000002C0000-0x0000000000313000-memory.dmp

              Filesize

              332KB

            • memory/2880-17-0x00000000004F0000-0x0000000000543000-memory.dmp

              Filesize

              332KB

            • memory/2880-20-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2880-287-0x0000000000400000-0x0000000000441000-memory.dmp

              Filesize

              260KB

            • memory/2880-15-0x00000000004A0000-0x00000000004E1000-memory.dmp

              Filesize

              260KB