Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

16/04/2024, 19:44

240416-yfyf3aag99 7

16/04/2024, 19:29

240416-x7jljscb21 7

Analysis

  • max time kernel
    123s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 19:29

General

  • Target

    asdasdasd.exe

  • Size

    131.9MB

  • MD5

    7bfb255681df845fa08e937447fa5c4a

  • SHA1

    3132cb69dbcf8964b9f8f286b2e2a14e47e614f7

  • SHA256

    b018ff7173447e00dcdf50ea416152ca45eafa0b373d15c02a45f52ae9ce142c

  • SHA512

    85aab548b1bfd1d9c4323af21a3c4231c75e8bd4484df53137799043c63677827779c3e99c00a95d5ea713165d29c9c95978a510c9ae33676e8656faf6e15228

  • SSDEEP

    1572864:84sMLl/BkZTVV2iplzf+ekzrMdTOG0AfhgojwlwVgmPQtn06H9rejAEdCoIZXCVv:hl/BkVVPBDgmPKa5Wnu3X7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe
    "C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Windows\SysWOW64\chcp.com
        chcp
        3⤵
          PID:3736
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4472
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
        2⤵
          PID:1568
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2952
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4744
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:684
        • C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe
          "C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\asdasdasd" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 --field-trial-handle=1940,i,14345400694268570474,11855482771547899091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:2216
          • C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe
            "C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\asdasdasd" --mojo-platform-channel-handle=2152 --field-trial-handle=1940,i,14345400694268570474,11855482771547899091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2348
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1556
            • C:\Windows\SysWOW64\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:4440
            • C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe
              "C:\Users\Admin\AppData\Local\Temp\asdasdasd.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\asdasdasd" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2908 --field-trial-handle=1940,i,14345400694268570474,11855482771547899091,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
              2⤵
                PID:1964

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              6ef1ee07865201ee53d9998ed1ec394e

              SHA1

              d33f4b751c38a0bc6c20516ec3c131b17b72a68f

              SHA256

              ca596afc4b092d0fc06d63d64b8e98790e3246b975763b72bfd2c185dbf546a3

              SHA512

              13315a7f1defdba4284f7e7a2250f3757f693f2891ca221ff251b4fe517c91866929f1b6992aea92ca7cdc96bc91ecb62b68f0e766d6d6a8ff5fad7041dc91d7

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              21KB

              MD5

              72e1d460bc6cc17304157b47b1b30846

              SHA1

              43ea6f6fd3e50abbd31b20cdbe5c75ddc2ced1b3

              SHA256

              85ff19acae879b3a15a97a803a1bab3f7adb900565b0e5a2a8b9fc44b157c35a

              SHA512

              72ded1552e58e018cdff74789f3b19656412f17d87adfb8fa444beee45cd109c19f0cf895143334a50f23c3103803e8249f1c968c731950ab75ec821af3ecdf2

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

              Filesize

              21KB

              MD5

              8ff5a5a62c9d97422d9068c4deb01ccb

              SHA1

              601b28b7d80f7365727382d976b3e41c37c1623f

              SHA256

              b7936afb7836d5f19ec5f301bf605d67a07c1e47ff72eb9445f0be86b41d5857

              SHA512

              e30dfb01246c7c7ed10e1b7ced26e18c3906b624e87874850ab7a283b244c3d73a968f55892814ba574a1e47881deedff5177b3a65753efc2e7df0391d77c495

            • C:\Users\Admin\AppData\Local\Temp\28e6015c-c07a-4188-9a35-8c3208be61ec.tmp.node

              Filesize

              1.5MB

              MD5

              780a9a3098c31b205974a45dc3a15278

              SHA1

              6308103a4f97d5e0daff24a28d576fe852ef17ce

              SHA256

              9668a9002fa87090cc78771e6365d1f8cbb7d85e54f963c5afcd23963ce3d2ba

              SHA512

              4a9071beaa94f44e88148e731f218ea2bab6594afe837a7414c94287939ba4e20fbd3afc91904ec52f0c104d537fed95516cc278e37e1981adeaacebccb6651d

            • C:\Users\Admin\AppData\Local\Temp\8b5233f3-8f9d-46b2-a094-f0d33f720f0e.tmp.node

              Filesize

              95KB

              MD5

              94d886881682434857d21ad7f08c9889

              SHA1

              1a3562ca09fa5a7ee075d78e1a360268e64b8617

              SHA256

              adac304b4e0b93ec46f469bd2a7451ab58ea1ed16e17d7a80e8b91312202c0a8

              SHA512

              92063672cdc076ca670b88a6d8eadaf9ae9fccf585a323b31c321d5a43ee7a9032ff4c0aea6e35e8847b1a9e149806322adf160c7f851e1c92112f43d093dc8e

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5onuxujz.mpr.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • memory/684-14-0x0000000072B40000-0x00000000732F0000-memory.dmp

              Filesize

              7.7MB

            • memory/684-94-0x0000000072B40000-0x00000000732F0000-memory.dmp

              Filesize

              7.7MB

            • memory/684-18-0x0000000005040000-0x0000000005050000-memory.dmp

              Filesize

              64KB

            • memory/684-59-0x0000000007E50000-0x00000000084CA000-memory.dmp

              Filesize

              6.5MB

            • memory/684-62-0x0000000008A80000-0x0000000009024000-memory.dmp

              Filesize

              5.6MB

            • memory/684-28-0x0000000005040000-0x0000000005050000-memory.dmp

              Filesize

              64KB

            • memory/684-50-0x0000000005FE0000-0x0000000006334000-memory.dmp

              Filesize

              3.3MB

            • memory/684-63-0x0000000007A20000-0x0000000007AB2000-memory.dmp

              Filesize

              584KB

            • memory/684-56-0x00000000069E0000-0x0000000006A24000-memory.dmp

              Filesize

              272KB

            • memory/684-39-0x0000000005E00000-0x0000000005E66000-memory.dmp

              Filesize

              408KB

            • memory/684-41-0x0000000005F70000-0x0000000005FD6000-memory.dmp

              Filesize

              408KB

            • memory/1964-123-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/1964-115-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/1964-114-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/1964-116-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/1964-121-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/1964-122-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/1964-120-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/1964-124-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/1964-125-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/1964-126-0x000000000E850000-0x000000000E851000-memory.dmp

              Filesize

              4KB

            • memory/2952-22-0x0000000004F30000-0x0000000004F52000-memory.dmp

              Filesize

              136KB

            • memory/2952-101-0x00000000049A0000-0x00000000049B0000-memory.dmp

              Filesize

              64KB

            • memory/2952-16-0x0000000072B40000-0x00000000732F0000-memory.dmp

              Filesize

              7.7MB

            • memory/2952-17-0x00000000049A0000-0x00000000049B0000-memory.dmp

              Filesize

              64KB

            • memory/2952-20-0x00000000049A0000-0x00000000049B0000-memory.dmp

              Filesize

              64KB

            • memory/2952-81-0x000000007F5E0000-0x000000007F5F0000-memory.dmp

              Filesize

              64KB

            • memory/2952-80-0x000000006C450000-0x000000006C49C000-memory.dmp

              Filesize

              304KB

            • memory/2952-54-0x0000000005E00000-0x0000000005E1E000-memory.dmp

              Filesize

              120KB

            • memory/2952-93-0x00000000074C0000-0x00000000074CA000-memory.dmp

              Filesize

              40KB

            • memory/2952-109-0x0000000072B40000-0x00000000732F0000-memory.dmp

              Filesize

              7.7MB

            • memory/2952-97-0x0000000007530000-0x0000000007554000-memory.dmp

              Filesize

              144KB

            • memory/2952-98-0x000000006C5C0000-0x000000006C914000-memory.dmp

              Filesize

              3.3MB

            • memory/4744-65-0x000000007EE50000-0x000000007EE60000-memory.dmp

              Filesize

              64KB

            • memory/4744-55-0x0000000006840000-0x000000000688C000-memory.dmp

              Filesize

              304KB

            • memory/4744-99-0x000000006C5C0000-0x000000006C914000-memory.dmp

              Filesize

              3.3MB

            • memory/4744-67-0x000000006C450000-0x000000006C49C000-memory.dmp

              Filesize

              304KB

            • memory/4744-58-0x00000000079A0000-0x00000000079BA000-memory.dmp

              Filesize

              104KB

            • memory/4744-105-0x0000000072B40000-0x00000000732F0000-memory.dmp

              Filesize

              7.7MB

            • memory/4744-57-0x00000000078F0000-0x0000000007966000-memory.dmp

              Filesize

              472KB

            • memory/4744-96-0x0000000007F20000-0x0000000007F4A000-memory.dmp

              Filesize

              168KB

            • memory/4744-64-0x0000000007D80000-0x0000000007DB2000-memory.dmp

              Filesize

              200KB

            • memory/4744-100-0x00000000053A0000-0x00000000053B0000-memory.dmp

              Filesize

              64KB

            • memory/4744-21-0x00000000053A0000-0x00000000053B0000-memory.dmp

              Filesize

              64KB

            • memory/4744-79-0x0000000007DE0000-0x0000000007E83000-memory.dmp

              Filesize

              652KB

            • memory/4744-19-0x00000000053A0000-0x00000000053B0000-memory.dmp

              Filesize

              64KB

            • memory/4744-77-0x0000000007DC0000-0x0000000007DDE000-memory.dmp

              Filesize

              120KB

            • memory/4744-78-0x00000000053A0000-0x00000000053B0000-memory.dmp

              Filesize

              64KB

            • memory/4744-15-0x00000000059E0000-0x0000000006008000-memory.dmp

              Filesize

              6.2MB

            • memory/4744-11-0x0000000005260000-0x0000000005296000-memory.dmp

              Filesize

              216KB

            • memory/4744-12-0x0000000072B40000-0x00000000732F0000-memory.dmp

              Filesize

              7.7MB