Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 22:23

General

  • Target

    6220a445563bfb9f4bd3e7c199d685a201c82df0d00a194a518aa52ab9370191.exe

  • Size

    41KB

  • MD5

    70408b748e9cbdf3534d0fced1343b22

  • SHA1

    d01f1e9556b20c1538f55a9f8896dac0b609f3ec

  • SHA256

    6220a445563bfb9f4bd3e7c199d685a201c82df0d00a194a518aa52ab9370191

  • SHA512

    e09e7071f83c56f41f815faa58d6aa1bb89e6f8b67137efaa31640e7c6dac637fa244a1c2174f7fa3a18ec14da7ff62e77ade17a91d2aa943c55d472eeba3fcb

  • SSDEEP

    768:xeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09sy:xq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSl

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 13 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6220a445563bfb9f4bd3e7c199d685a201c82df0d00a194a518aa52ab9370191.exe
    "C:\Users\Admin\AppData\Local\Temp\6220a445563bfb9f4bd3e7c199d685a201c82df0d00a194a518aa52ab9370191.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 824
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    e6d3a9805fc52915c7c4edbbdb97b6d7

    SHA1

    8ceb78fe114b49c248ee2eed96171b8a6bbb33a9

    SHA256

    d6c415bfeadc3ef8ef4855b2110b3e14e1c6501a721e4059a3e9087b5cbbe3bf

    SHA512

    d15aabf22215a2ade19cb49397e595f1e3713c8b7700d3ba01bfbcf10f771cca9451199a9ba9f940cce015109cf2ef4bb106bfa49c627d8b7fadd71e9c42e4e2

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    c56a6aab270534887f5eaaff3b60ffbd

    SHA1

    1700037aac3c6afa4bd1a1c4d17dfdab9437fc04

    SHA256

    98de75dc8215bd5973c1075f52a452da002a3fd897f062e007fe3ed0359bda8a

    SHA512

    e8f38833ca455bd6a52e547d72b79a32df40c2ed28ac59e444e62aab117e9d02db67a7978c633a39e6607603106f7a5c617f8d2dc99521e67da02cca3f961fb2

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    7119515e0e37f581dbb2ae4022361eae

    SHA1

    56e21860558819f73752a04aac56b653c5d91278

    SHA256

    a61b18d60e52bcc426e45f509f59d6cb5db24b90c6ccdf533e9e81981ea20328

    SHA512

    97613e861f0ad888a2363ebca2594549ad1da0953ffaf059621c49d45018a227c86ac6ef14f1a53521ee07a35a87dddc611e1cad64f2d02af82b51ed2d1c83df

  • \Windows\SysWOW64\smnss.exe

    Filesize

    41KB

    MD5

    7e0cadd02b679f901ef322255d01c833

    SHA1

    549c22ce3660d9de0731cbc7b9df80a94579f702

    SHA256

    537c91caee8e5f0f96f29e6da1314a4c7803c51edbf5c223cdceb332df1f19dc

    SHA512

    e68ca7742dca6895f02b0e440b74e32baad53945051587f74e15e7762c986dce775b73df9855f7eb81ea56a898013bf3d3486947eb3498dad432f98d0207b4d0

  • memory/876-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/876-32-0x0000000000340000-0x000000000035F000-memory.dmp

    Filesize

    124KB

  • memory/1668-47-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1668-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1668-41-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1668-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2336-18-0x0000000000320000-0x0000000000329000-memory.dmp

    Filesize

    36KB

  • memory/2336-24-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2336-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2336-27-0x0000000000320000-0x0000000000329000-memory.dmp

    Filesize

    36KB

  • memory/2336-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2336-14-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB