Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/04/2024, 17:18

General

  • Target

    6fd67ca0062f09a5d839f9de4d01314fb7b434c0a987731d514af09ae97750e7.exe

  • Size

    41KB

  • MD5

    542adcb1bd6f3734ff7f097808f11436

  • SHA1

    417b78f2845555d795fc7b14658f3358e806ca8f

  • SHA256

    6fd67ca0062f09a5d839f9de4d01314fb7b434c0a987731d514af09ae97750e7

  • SHA512

    a4f9ca8cd6d8a963ed84563c48bd41a34e7c3754f324b66cdaf131260c4502cc1d17fa125c904c4be61557a85727df7a2a6f416b86b08e4e8e4112ee12e54582

  • SSDEEP

    768:xeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09Cy:xq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSz

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 16 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fd67ca0062f09a5d839f9de4d01314fb7b434c0a987731d514af09ae97750e7.exe
    "C:\Users\Admin\AppData\Local\Temp\6fd67ca0062f09a5d839f9de4d01314fb7b434c0a987731d514af09ae97750e7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 840
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    9098581762e3f0b6d30f8af5b7ea80fc

    SHA1

    80426b59d8f807c0fac74cde48d53ee514bef6a2

    SHA256

    c1f4b153d205c56e4d1f48ceb47e7145b19965faff0af9ce9d1f195763d61d03

    SHA512

    6951bb3da6212d7ccb53353221c6601e5c6640c984dd78985d83c6ab439a904ee584e2a33ba78e6bb94d7abc6aaf5564e09fe68de779534244a18f12c286dfa3

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    87b767437b4564c0fa91415b8eebb61b

    SHA1

    e68880b92f071d3fd068ca77c7dee237ed11f969

    SHA256

    24b171f56a0f942606343a31c07aeefec17dbfa779ca68ba74712f8ef343582b

    SHA512

    ebf6f499ce7283afbc3bb737d8c3d0e31788e23517ad4207068e2ee73c1a63e1d741392f9e24cc898bb0f9806113fc886f786fc9830cbd84c981a0bf76050077

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    d362e35b5a3c7c253dd925777ef692de

    SHA1

    3dbaf20aab391184687648271473e52074800d9d

    SHA256

    38954f84272195c7224999a4399f50ca69ecf58cfbf6422bfe07d62df79cf7c7

    SHA512

    0ef2e4382ed216e9fb0c5b0f962bbbc76adc2c5f0b31c72011c63296df18997554cf5f644bddb6e5d448937455313ff1100c47a82649032b9884a26839952b70

  • \Windows\SysWOW64\smnss.exe

    Filesize

    41KB

    MD5

    0a18edb8b8fcc6585cbc6fb0f60806b1

    SHA1

    0d2d403edcc8cac9c41b6c4d2880d85b91da2ed5

    SHA256

    1dc347bcd7ee33a3d34a8c2d42de557309586515909eafb1ac32bc46b404c43b

    SHA512

    d2a68fe7493bfe785f5a5f04aa288b8f6671c5b04089ed0f562bda267ddba999e2a37adad3defed170b65abd5f9eed5530abaa4471dbed933f235c5f412f3d2a

  • memory/1524-18-0x00000000002B0000-0x00000000002B9000-memory.dmp

    Filesize

    36KB

  • memory/1524-24-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1524-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1524-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1524-15-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2540-38-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2540-40-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2540-42-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2540-43-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2540-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2640-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2640-34-0x0000000000320000-0x000000000033F000-memory.dmp

    Filesize

    124KB

  • memory/2640-49-0x0000000000320000-0x000000000033F000-memory.dmp

    Filesize

    124KB