Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/03/2024, 16:01

240327-tgmczaah2s 8

27/03/2024, 15:52

240327-tbdhwafd87 8

Analysis

  • max time kernel
    117s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 16:01

General

  • Target

    UnlockTool-2024-03-22-0.exe

  • Size

    184.6MB

  • MD5

    49297f37905a3d9497115cb2cfea4d8a

  • SHA1

    f52fdd473233453bf037e0d15089035d3d481ac2

  • SHA256

    11bf0c36322d987b12c4a944672f9ab5b095db9e66181b641f8fa1bbe0b9e193

  • SHA512

    d23b30c6645ac8fbaf5b33526702720cc4f1a6db6c8b5b35036c7d4207898d10adbcce5f9ca8615ec68729f300910b04a5e452877dfab8543a36caf176b8023c

  • SSDEEP

    3145728:H7fHpOE8Q/K6jVx913QrdPoBRGLj6+4jn5G1U72k32SriPd3:HbFXLjVx9tQqBRG36+475p77N4

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 2 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UnlockTool-2024-03-22-0.exe
    "C:\Users\Admin\AppData\Local\Temp\UnlockTool-2024-03-22-0.exe"
    1⤵
    • Manipulates Digital Signatures
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3048
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\UnlockTool\Drivers\pwndfu\x86\libusb0.dll

      Filesize

      45KB

      MD5

      1a534450750eca1f3d951def8d9965bf

      SHA1

      7dd82b6d52a840c4979a7515fc7a9ca3725363c4

      SHA256

      5e84d13636fbce7869cddc8b20c7d83fa0063e98c319e8e5ab751edc9ee1da76

      SHA512

      3acdfff24a4d9ebb4e9647afccf95f33b4580980fb35a91eff65a01ce470b0bbc1a3a27c476653911f1fa431757ca64c945da89da54bffa599744f29123ef715

    • memory/3048-0-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/3048-2-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/3048-4-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/3048-5-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/3048-7-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/3048-9-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/3048-11-0x000000001C180000-0x000000001C181000-memory.dmp

      Filesize

      4KB

    • memory/3048-10-0x0000000077B90000-0x0000000077B91000-memory.dmp

      Filesize

      4KB

    • memory/3048-13-0x000000001C180000-0x000000001C181000-memory.dmp

      Filesize

      4KB

    • memory/3048-15-0x000000001C180000-0x000000001C181000-memory.dmp

      Filesize

      4KB

    • memory/3048-16-0x000000001C190000-0x000000001C191000-memory.dmp

      Filesize

      4KB

    • memory/3048-18-0x000000001C190000-0x000000001C191000-memory.dmp

      Filesize

      4KB

    • memory/3048-20-0x000000001C190000-0x000000001C191000-memory.dmp

      Filesize

      4KB

    • memory/3048-23-0x000000001C1B0000-0x000000001C1B1000-memory.dmp

      Filesize

      4KB

    • memory/3048-25-0x000000001C1B0000-0x000000001C1B1000-memory.dmp

      Filesize

      4KB

    • memory/3048-28-0x000000001C1C0000-0x000000001C1C1000-memory.dmp

      Filesize

      4KB

    • memory/3048-30-0x000000001C1C0000-0x000000001C1C1000-memory.dmp

      Filesize

      4KB

    • memory/3048-33-0x000000001C1D0000-0x000000001C1D1000-memory.dmp

      Filesize

      4KB

    • memory/3048-35-0x000000001C1D0000-0x000000001C1D1000-memory.dmp

      Filesize

      4KB

    • memory/3048-38-0x000000001C1E0000-0x000000001C1E1000-memory.dmp

      Filesize

      4KB

    • memory/3048-40-0x000000001C1E0000-0x000000001C1E1000-memory.dmp

      Filesize

      4KB

    • memory/3048-41-0x000000001C1F0000-0x000000001C1F1000-memory.dmp

      Filesize

      4KB

    • memory/3048-43-0x000000001C1F0000-0x000000001C1F1000-memory.dmp

      Filesize

      4KB

    • memory/3048-45-0x000000001C1F0000-0x000000001C1F1000-memory.dmp

      Filesize

      4KB

    • memory/3048-46-0x000000001C200000-0x000000001C201000-memory.dmp

      Filesize

      4KB

    • memory/3048-48-0x000000001C200000-0x000000001C201000-memory.dmp

      Filesize

      4KB

    • memory/3048-50-0x000000001C200000-0x000000001C201000-memory.dmp

      Filesize

      4KB

    • memory/3048-52-0x000000001C210000-0x000000001C211000-memory.dmp

      Filesize

      4KB

    • memory/3048-51-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-54-0x000000001C210000-0x000000001C211000-memory.dmp

      Filesize

      4KB

    • memory/3048-56-0x000000001C210000-0x000000001C211000-memory.dmp

      Filesize

      4KB

    • memory/3048-57-0x000000001C220000-0x000000001C221000-memory.dmp

      Filesize

      4KB

    • memory/3048-60-0x000000001C220000-0x000000001C221000-memory.dmp

      Filesize

      4KB

    • memory/3048-58-0x0000000077B90000-0x0000000077B91000-memory.dmp

      Filesize

      4KB

    • memory/3048-62-0x000000001C220000-0x000000001C221000-memory.dmp

      Filesize

      4KB

    • memory/3048-63-0x000000001C230000-0x000000001C231000-memory.dmp

      Filesize

      4KB

    • memory/3048-65-0x000000001C230000-0x000000001C231000-memory.dmp

      Filesize

      4KB

    • memory/3048-69-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-67-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-81-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-91-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-104-0x0000000077B90000-0x0000000077B91000-memory.dmp

      Filesize

      4KB

    • memory/3048-102-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-115-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-122-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-129-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-135-0x0000000077B8F000-0x0000000077B90000-memory.dmp

      Filesize

      4KB

    • memory/3048-184-0x000000001C4D0000-0x000000001C4D1000-memory.dmp

      Filesize

      4KB

    • memory/3048-492-0x000000001C4D0000-0x000000001C4D1000-memory.dmp

      Filesize

      4KB