Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/05/2024, 19:05

240514-xrnkkabe5x 7

07/05/2024, 00:36

240507-axztfsdd54 7

07/05/2024, 00:07

240507-aee2bsce26 7

Analysis

  • max time kernel
    214s
  • max time network
    224s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 19:05

General

  • Target

    update_release_x86_64_.exe.7z

  • Size

    13.1MB

  • MD5

    075a892cdef834e2d1e4f0998e32817c

  • SHA1

    ed4d5d3836359e7a121f620197f1ba52768ba8be

  • SHA256

    5af8c7f5923a113a9cb32c45435fcb618ffe6dc1d65b1346524af256570a9886

  • SHA512

    e07c3d8fa14f0a4bfa4592bea6cd9deb1db5be1bb23449fa991d735fba453a682f13b24cd9d13c1221f2ff2898fad02bce8b09b2432e16e8c6e6adf10ab6efd4

  • SSDEEP

    393216:4P63NPD8PN2MzBTkWKSf79iWSkJLiCDETMM:44Nbo2MtTkM/VLiCD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe.7z
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe.7z"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2716
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2840
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe.7z"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1044
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4f8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2652
    • C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe
      "C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Users\Admin\AppData\Local\Temp\onefile_540_133601873037066000\linux_wsl_2.exe
        "C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2168
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\" -an -ai#7zMap3865:130:7zEvent3893
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1052
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1244

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\onefile_540_133601873037066000\python311.dll

        Filesize

        5.5MB

        MD5

        5a5dd7cad8028097842b0afef45bfbcf

        SHA1

        e247a2e460687c607253949c52ae2801ff35dc4a

        SHA256

        a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce

        SHA512

        e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858

      • \Users\Admin\AppData\Local\Temp\onefile_540_133601873037066000\linux_wsl_2.exe

        Filesize

        20.9MB

        MD5

        5be7258c944760f57cb7e103b0dc1a9d

        SHA1

        3930c306a72463334ec62773ede645c8b0ded3fd

        SHA256

        e3bd8cbdeb3cc6b0fcca0a19ee7da2bc8b6bc04e9e3c2007d4c5afdc5ee01c33

        SHA512

        c43ea9d867ac2b5a601c70d2b7e9ba4d234c93c68f19e53f3b5040df2100652fa8ae6fd5056dcd4e0b446aa565b5198afa9870b46ffff4e029ae9671b4ce60f1

      • \Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe

        Filesize

        13.1MB

        MD5

        a242becef481a0115f6196937ad13ca8

        SHA1

        4be300ac5db16ff38fbf2936d68cab02a4c577b3

        SHA256

        6481c9aedb7ed19fe0aaf9a08a400a19f3dd4ea6454ee5c59f3f88e407e38edb

        SHA512

        0a3ae2da64e2500f0a3bfb9cc4f383fc757f7869e924879d9f8d25284170ea72510ed2dbd4939b84bc6159ceb867a2abc454eb98433050dc508c05e645025638

      • memory/540-52-0x0000000140000000-0x0000000141A3F000-memory.dmp

        Filesize

        26.2MB

      • memory/540-50-0x000007FEFDA80000-0x000007FEFDA81000-memory.dmp

        Filesize

        4KB

      • memory/540-48-0x000007FEFDA80000-0x000007FEFDA81000-memory.dmp

        Filesize

        4KB

      • memory/540-36-0x0000000077B60000-0x0000000077B61000-memory.dmp

        Filesize

        4KB

      • memory/540-46-0x000007FEFDA80000-0x000007FEFDA81000-memory.dmp

        Filesize

        4KB

      • memory/540-44-0x000007FEFDA80000-0x000007FEFDA81000-memory.dmp

        Filesize

        4KB

      • memory/540-42-0x0000000077B60000-0x0000000077B61000-memory.dmp

        Filesize

        4KB

      • memory/540-40-0x0000000077B60000-0x0000000077B61000-memory.dmp

        Filesize

        4KB

      • memory/540-38-0x0000000077B60000-0x0000000077B61000-memory.dmp

        Filesize

        4KB

      • memory/540-35-0x0000000140000000-0x0000000141A3F000-memory.dmp

        Filesize

        26.2MB

      • memory/540-171-0x0000000140000000-0x0000000141A3F000-memory.dmp

        Filesize

        26.2MB

      • memory/2168-115-0x000000013FE80000-0x00000001413C9000-memory.dmp

        Filesize

        21.3MB