Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    172s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 19:09

General

  • Target

    4ac521874c75d495e588f0eff9a9816077e7d034110a818c212a0fb34b2ab997.exe

  • Size

    1.8MB

  • MD5

    51c316cf74048d487d82d480b0c4f227

  • SHA1

    a42346cfed08544cb288585eee286f470f429832

  • SHA256

    4ac521874c75d495e588f0eff9a9816077e7d034110a818c212a0fb34b2ab997

  • SHA512

    baf13ab2ec636a901dd077be84a07e433c1abbc640e4bf2c2af0bd7e7b7f12f038e7a997dea3898d34bfb4e3f7a4c9b63308602387e6e5bbc14578c7a2c69883

  • SSDEEP

    49152:RKJ0WR7AFPyyiSruXKpk3WFDL9zxnSS11tmlNQ2ayVup3:RKlBAFPydSS6W6X9lnr11wlNQ1ya

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 14 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ac521874c75d495e588f0eff9a9816077e7d034110a818c212a0fb34b2ab997.exe
    "C:\Users\Admin\AppData\Local\Temp\4ac521874c75d495e588f0eff9a9816077e7d034110a818c212a0fb34b2ab997.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2176
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:2692
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2328
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:896
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 1bc -NGENProcess 1c0 -Pipe 1cc -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1528
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d0 -InterruptEvent 240 -NGENProcess 228 -Pipe 23c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1876
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:2616
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2404
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:672
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:3012

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    768KB

    MD5

    be39e3219e346fbd4451335cb25d3253

    SHA1

    6e12ff30d76f0a4f5ab97c9b10ed6ff3615891eb

    SHA256

    9ad50f1ce2e55d66691744e30b7acd6412aec331062074647a4c09416e1f5e7c

    SHA512

    32dc6720254a55b12e88a0eb1476bd82cc7b78a7a4bb00051207b62195f43b917e37dbde74d428640a6ac4a9963671c85091f22f03bd8a39c8f425f63be8fc2a

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    30.1MB

    MD5

    0c9ff83ded8710ba1fa08fa8f05915a1

    SHA1

    ce0d6a2ef2441f540b40f578cff331045ee213ff

    SHA256

    6cb34f2a2edd74300bbe35191a746a25603f8a2eaebfb009b7bf4f8bd38a7c4a

    SHA512

    45aa629159afedecc2b2bd474d188a17c9f87eb7de5534787d26aafeea43f61ce7c5369a5433f0e0e75d1f010b11054534661866b569624959b8053472a5ef1b

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.4MB

    MD5

    106df0e807eb9af5ec9f752d07a46b2e

    SHA1

    dd34b73202bfe486391361746e7c35abdee3d1c5

    SHA256

    fa652a1c716518f2be41ef39448356024c972802c54ffee09a98349928b0bf95

    SHA512

    db095d98685ad6a6a7b04d7b890324c22613f61202f4735cbaf0fbf331ab223764c8fe10208e987ee0d87c27524c2f5804e8c4481ba31d1761165bf05ba9788e

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    2.1MB

    MD5

    a04198a072441fde0b3e6f6f9dc00cd3

    SHA1

    659de1a78bf18e00da063591b777ad945e7b546c

    SHA256

    ffa3b9c3acb5de5b09d77d6c9be1dbbf0bbbbfe1fd7098a36b755bd3cbb36d4d

    SHA512

    064fe8d6750fffcba3a3289d0a1d274bac152e824034db483209f7bbd80f482e829e8358949606740962a8dd07c6f3a64c5a239f0688ef14f0c34a8f990f8209

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.2MB

    MD5

    e4403fce7a25918afab066e4327c79e5

    SHA1

    193eb79aa64556c0a39381a95122d156c80175f7

    SHA256

    dc9850d8253f84ed69515aee55275649842b871fed7db4d03231788f64dc94b8

    SHA512

    ac73610166479254c4e07a0ecff5e0b2e25e4e551ce5cee60214a03378ee674bb7b80278984f52a635004c1375e1dcd32f62ebe021ae32b817ed0b148de978c0

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    19eae6de6a36fc2c42108ade5997f301

    SHA1

    19ae3f2ed904bec68dbf5fe7d6782d0cc89f2105

    SHA256

    0e7ae81bcfd4709215392313d27825e8a95ea59c6fcd4dacdc1ff55484460952

    SHA512

    088d4a19a4b780eda9a14c29424162a1aca7650499f165d992d83d70cb99996c09b44fa2347848602803defa461674e51ea78c1f99931c108c95c4f1dd58ea77

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.3MB

    MD5

    ec27eec64421f4e1e86db16c735de94a

    SHA1

    b136928912d62aa52c78c9d15f3dbe4117651337

    SHA256

    dda8d624b454bf850d7e3035ff7e455fb425167771cf1081ae168259daffaa46

    SHA512

    b193fe4d0edd292bca687755356649281e04e9a9824a857442aba1accbc16c12453bce59b4bc51d2efa4a98789e36f8c0946a874598de4bac29cf56879f5524a

  • \Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    dac94f730e709cf6145d025e09f9b629

    SHA1

    77d88e94729f9f1d5b8364d7a7210073ee4549f8

    SHA256

    976ec7a5de62b2b2777336b56ee14a449fc3b429e0e1c0b7560439541ff6dc58

    SHA512

    fcbe5bb4393afc9e06a68ad2da5bdcf0b4da6711bc900bb3a92706efe9779740c61c885b70760e5f5cea8a51a387e2d6673e915d864fcc666bfa918ce86206bc

  • memory/672-264-0x0000000000FE0000-0x0000000001040000-memory.dmp

    Filesize

    384KB

  • memory/672-263-0x0000000140000000-0x0000000140209000-memory.dmp

    Filesize

    2.0MB

  • memory/896-174-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/896-187-0x0000000000400000-0x00000000005E7000-memory.dmp

    Filesize

    1.9MB

  • memory/896-181-0x0000000000790000-0x00000000007F7000-memory.dmp

    Filesize

    412KB

  • memory/896-175-0x0000000000790000-0x00000000007F7000-memory.dmp

    Filesize

    412KB

  • memory/1440-190-0x00000000001F0000-0x0000000000250000-memory.dmp

    Filesize

    384KB

  • memory/1440-196-0x00000000001F0000-0x0000000000250000-memory.dmp

    Filesize

    384KB

  • memory/1440-226-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/1440-198-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/1528-218-0x0000000000320000-0x0000000000380000-memory.dmp

    Filesize

    384KB

  • memory/1528-220-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/1528-265-0x000007FEF5400000-0x000007FEF5DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/1528-225-0x0000000000320000-0x0000000000380000-memory.dmp

    Filesize

    384KB

  • memory/1528-250-0x0000000000320000-0x0000000000380000-memory.dmp

    Filesize

    384KB

  • memory/1528-249-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/1876-268-0x0000000140000000-0x00000001401ED000-memory.dmp

    Filesize

    1.9MB

  • memory/1876-245-0x00000000005C0000-0x0000000000620000-memory.dmp

    Filesize

    384KB

  • memory/1876-239-0x00000000005C0000-0x0000000000620000-memory.dmp

    Filesize

    384KB

  • memory/2176-7-0x0000000000240000-0x00000000002A7000-memory.dmp

    Filesize

    412KB

  • memory/2176-89-0x0000000000400000-0x00000000005DB000-memory.dmp

    Filesize

    1.9MB

  • memory/2176-167-0x0000000000400000-0x00000000005DB000-memory.dmp

    Filesize

    1.9MB

  • memory/2176-0-0x0000000000400000-0x00000000005DB000-memory.dmp

    Filesize

    1.9MB

  • memory/2176-1-0x0000000000240000-0x00000000002A7000-memory.dmp

    Filesize

    412KB

  • memory/2328-170-0x0000000140000000-0x00000001401DC000-memory.dmp

    Filesize

    1.9MB

  • memory/2328-172-0x0000000140000000-0x00000001401DC000-memory.dmp

    Filesize

    1.9MB

  • memory/2404-235-0x0000000000230000-0x0000000000297000-memory.dmp

    Filesize

    412KB

  • memory/2404-230-0x0000000000230000-0x0000000000297000-memory.dmp

    Filesize

    412KB

  • memory/2404-267-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/2616-215-0x00000000001E0000-0x0000000000240000-memory.dmp

    Filesize

    384KB

  • memory/2616-214-0x00000000001E0000-0x0000000000240000-memory.dmp

    Filesize

    384KB

  • memory/2616-208-0x00000000001E0000-0x0000000000240000-memory.dmp

    Filesize

    384KB

  • memory/2616-205-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/2692-121-0x0000000100000000-0x00000001001E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2692-73-0x0000000000930000-0x0000000000990000-memory.dmp

    Filesize

    384KB

  • memory/2692-64-0x0000000000930000-0x0000000000990000-memory.dmp

    Filesize

    384KB

  • memory/2692-65-0x0000000100000000-0x00000001001E3000-memory.dmp

    Filesize

    1.9MB