Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe
Resource
win10v2004-20240426-en
General
-
Target
3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe
-
Size
12KB
-
MD5
b0510443d664e0b905d0eb0d437c8b26
-
SHA1
47695ccc9af844332e64308ee00d07610a885153
-
SHA256
3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12
-
SHA512
e8eeacf9cb65da281db439daa1bc472d29e479573da3992fdf458495037f630779c3bef7c77867d7f6bdc9a89a2e09392b469292d8adca685c6ce3f4e5a4207a
-
SSDEEP
384:XL7li/2ztq2DcEQvdhcJKLTp/NK9xaUv:bNM/Q9cUv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2916 tmp1C96.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2916 tmp1C96.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1228 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe 28 PID 2140 wrote to memory of 1228 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe 28 PID 2140 wrote to memory of 1228 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe 28 PID 2140 wrote to memory of 1228 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe 28 PID 1228 wrote to memory of 2668 1228 vbc.exe 30 PID 1228 wrote to memory of 2668 1228 vbc.exe 30 PID 1228 wrote to memory of 2668 1228 vbc.exe 30 PID 1228 wrote to memory of 2668 1228 vbc.exe 30 PID 2140 wrote to memory of 2916 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe 31 PID 2140 wrote to memory of 2916 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe 31 PID 2140 wrote to memory of 2916 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe 31 PID 2140 wrote to memory of 2916 2140 3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe"C:\Users\Admin\AppData\Local\Temp\3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cucjgmfa\cucjgmfa.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1E4A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc31DAD9D1D27B493C8640A0F1D822C5F6.TMP"3⤵PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp1C96.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1C96.tmp.exe" C:\Users\Admin\AppData\Local\Temp\3389d69cef7002a79cfb00279134d1dd459103cad074b4dcaac9657db01d1c12.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD581b5ad21ad2f65849d669e20a8cba674
SHA1f484b060a53c9648affcbb335017622788ff4658
SHA256bc41b57e722500c85cc77c45b61fddd2d8d85995142dce4c77b9db691a4d9010
SHA512ad84da235fb4c175212007b2edf697bca50b684f3e50fb552ab0c7e3687fb8d3d13d6838a6e821e48f2fe26eb732282e8626eecd42e3aad6d2cd4d825e4912ec
-
Filesize
1KB
MD5e62b4c9bcd7ba64a1da2e733eb4d2de8
SHA13de8f1aa244a5bb5cebc1007de914a4ed300c662
SHA2562b65918cf46ac5f460c1d02cf6280ac51edf2f2acc93a11918fc5d80f6fb4c9a
SHA5129fd3d44ed2b128631cff68089eb0334bb91df0cf4bb2637104bc8f61d248080fb4fcc26b1de5a9816c0de78d8a995995e5a94dde58b25ebfea4c2c91d39999ed
-
Filesize
2KB
MD56252f0e4921e8db9b34eede2a158345d
SHA1c6a6b8b82d5c1569bbbd2cc1fc075ac4fa013627
SHA256e93d0e467b11d238458372b1c284e08c5f2864866732f9af1c341502b76b4847
SHA51245aba360d97d15cadf9203bf59ee2da8614fef255efa9d721780c2dd5c7ad8f5c9d2ed3849d3c0cf51635b097cf91e32aaebb434ff5124c0c9549ac407a21b26
-
Filesize
273B
MD5fbd709b07c1473b72cadf21838f7044d
SHA1e4d265478844c0668a501e3ab1f3250578fa0915
SHA256a18470b229d4de17ea046bef4130e14fbe0fb7817dabc064012f8cb31205b5ad
SHA5121d8fa34ce409d8dcb971821ea875d1cdd965ae6a75aca9e2b90bbcf315cd38ef936b23a7ecde8eb0ef99679b76b682127e330f26f789050e6c19f4ec1eaea028
-
Filesize
12KB
MD534531d69d4066aeed6f5903f522b6f9a
SHA1e4c83cb92902f361d71f7da576b44c3e6ce34a9e
SHA25611963f798272e6efbffa1fd340506b5b66ef9cefcea13a6798abba315e285371
SHA5120ae7ea319e8a42d1af56861495a455202629e2a82271de8ef8dc6b7a322af901fbff54b46e0f44bdd0eb0d0629c75e563fd54a4b2a7fcabbfeda44b2b0ef4635
-
Filesize
1KB
MD55bab6947c0a5d44162ca46938193b5ec
SHA1af6bdd486a14cf45d72266378cbd28d0a2487ff1
SHA25607c18bbf7c5683f88d6ad03f6f4fbe534614aef51ece97fa6f052eec09f87bfa
SHA512db61a26f2e7fd15ca58ca2f67b9414742203ea0203b20dce7d5086d642e3177911da5c9c9fe15a4e89f86d5ac18ff2760e201415fb5c9bc0ace01fbb20b1d6f4