Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2024, 16:06

General

  • Target

    e2117b441bb00e4bd08f23ec09ecfe03.exe

  • Size

    1.6MB

  • MD5

    e2117b441bb00e4bd08f23ec09ecfe03

  • SHA1

    af1eb8b5e2c453981579b06346d4762697aa5035

  • SHA256

    469c034a1b0db632b355417177df3872abd056bd300ac457fae4ed4d9cb2ce8b

  • SHA512

    975e802de0d951e154998d3ed487d8e5364674ae8de5be90bef3c554af3af0d9ff62cc6cd06a4367227baf7405e5f23f2f7a64eb566bfc160e2f706500616351

  • SSDEEP

    49152:dPUci59mkTB8cRczJBhE8/iIviTwpIHDY:hUT5Qkec0JjE8K6iToIj

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 18 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2117b441bb00e4bd08f23ec09ecfe03.exe
    "C:\Users\Admin\AppData\Local\Temp\e2117b441bb00e4bd08f23ec09ecfe03.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c \DelUS.bat
      2⤵
        PID:2616
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c \DelUS.bat
        2⤵
        • Deletes itself
        PID:2576
      • C:\Program Files (x86)\IDBoan\IDBoan.exe
        "C:\Program Files (x86)\IDBoan\IDBoan.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Program Files (x86)\IDBoan\IDBoanUpdate.exe
          "C:\Program Files (x86)\IDBoan\IDBoanUpdate.exe" /run0
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Program Files (x86)\IDBoan\IDBoan.exe
            "C:\Program Files (x86)\IDBoan\IDBoan.exe" /run0
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1820
            • C:\Program Files (x86)\IDBoan\IDBoanMon.exe
              "C:\Program Files (x86)\IDBoan\IDBoanMon.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              PID:1336
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2084

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\DelUS.bat

      Filesize

      200B

      MD5

      8154d502b83604f36c4d6adc84ed4598

      SHA1

      c2955f3c695c6fe78ca722016d53afa331459c3f

      SHA256

      523748a7144269e74c808455b06502aa344f4a161910d60e5fe8d33039e1687d

      SHA512

      c934d9e3bb0b56e19aa491d71a286bf325b42704877e7b60fedaf63570af68a97e72e4c3510b52d7fc8cc7e4a9caf466cbbd882ff86074f19ea40caa74a62c07

    • C:\Program Files (x86)\IDBoan\IDBoanMon.exe

      Filesize

      703KB

      MD5

      0ccf16a3c9d76eada96efd81e341fc5b

      SHA1

      1dd0a95554d0500c0784a0570cff30acf996ef48

      SHA256

      3bc95b546a70fdf885feda183288dcf4535719a4d7411479bd17de75197dbcc6

      SHA512

      40b6100f03e4d14d7871dc471322dee43da5ce554ca029e693eb0211dcb5c4ec9f692cb2cf12765ff902b2c32e9be504cb461b313dcd3ad8a246ba86e61496c1

    • C:\Program Files (x86)\IDBoan\IDBoanUpdate.exe

      Filesize

      1.8MB

      MD5

      5c26d3ae5bf2eafe78bb906d81047b48

      SHA1

      5badbfe50bca04ca88f4d1f336d1f925ef4da7f0

      SHA256

      7784f1f422aa413a4d556ad0b732b059564527c5d7ac2da5adbb2c9e89f39c5c

      SHA512

      ca7747cd4f4f125dff732bf36fcd2e89a02c01a500f117be650c46d3726cb6b032c5a4148f3618e4fc7b2746be3ee4e6d64b8bfc2edc280ebe4b918b10a6e25f

    • \Program Files (x86)\IDBoan\IDBoan.exe

      Filesize

      4.6MB

      MD5

      5826ff472ed14d14df0a306a171ac452

      SHA1

      49fd18bb02f8dd5272fa7fa03ae02fba032370f7

      SHA256

      4d9be43a1afc60e525c23ca54b0bcc2f80d15094652b1b791336175b5108635c

      SHA512

      01443b02882d99ab2888609530bb4b30621d79bdb8a5a9d3d773cc8547af9f293a99b1837dfe39de2e36ecd95ebbd22fa20f95923c92126e23076e8dd155dd6d

    • \Users\Admin\AppData\Local\Temp\nsisos.dll

      Filesize

      5KB

      MD5

      69806691d649ef1c8703fd9e29231d44

      SHA1

      e2193fcf5b4863605eec2a5eb17bf84c7ac00166

      SHA256

      ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

      SHA512

      5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

    • \Users\Admin\AppData\Local\Temp\nsy117F.tmp\DLLWebCount.dll

      Filesize

      28KB

      MD5

      0bdd7c6f1046ea4b42839f991ae53fb2

      SHA1

      cb9baefb10159b4a684fa1ee4372e7715865052d

      SHA256

      0a0019b2603dbc4505453c2501255ab0cc0b3c317ece4a6ce0cfb6a02a30907b

      SHA512

      96f41497f25d7bc81f51ab167f74243b4b767089c89c26f9752ef518fa60dedd2722c66ae87dad2334bcce1622bc12f7b9b892ae654ca58cecd9f35c9f1dc163

    • \Users\Admin\AppData\Local\Temp\nsy117F.tmp\SelfDelete.dll

      Filesize

      24KB

      MD5

      7bf1bd7661385621c7908e36958f582e

      SHA1

      43242d7731c097e95fb96753c8262609ff929410

      SHA256

      c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e

      SHA512

      8317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f

    • \Users\Admin\AppData\Local\Temp\nsy117F.tmp\System.dll

      Filesize

      11KB

      MD5

      c17103ae9072a06da581dec998343fc1

      SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

      SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

      SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • memory/1820-79-0x0000000000E40000-0x0000000000E42000-memory.dmp

      Filesize

      8KB