Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 23:45

General

  • Target

    771234a03592f5c15e85cd2eef33d993bb61b957841cc62cbc69b6b474d98389.exe

  • Size

    240KB

  • MD5

    3b8204c94aaa3d5281ec1b5850bcf7f9

  • SHA1

    6d8526132b9aafc2877f29bac30feb4a55b7c57b

  • SHA256

    771234a03592f5c15e85cd2eef33d993bb61b957841cc62cbc69b6b474d98389

  • SHA512

    ea9963001ba90086f12a69e5f40a7c131dbacfb90a51ed22eb2ec8bca0bdce94b60ecb9bfb574c33f44839c74ba09f76874fd7123dc7d78a1a32fde7aaa54be3

  • SSDEEP

    1536:iq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bB:iq5ud9qHFO8Kf3rIIbB

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 12 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\771234a03592f5c15e85cd2eef33d993bb61b957841cc62cbc69b6b474d98389.exe
    "C:\Users\Admin\AppData\Local\Temp\771234a03592f5c15e85cd2eef33d993bb61b957841cc62cbc69b6b474d98389.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 868
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    e23704ea2e486d4bd80f936ba2c53e0d

    SHA1

    db777b17998d2adc68df466c89385150cf4bf431

    SHA256

    e245aad1ee26cc41125f22fb818f2a1fd70c556e2535e498e7c05293220d9009

    SHA512

    351a1825f66a0b3aa5269b9898fd8fc51c8188caaf3268a0df20da0202ba87547927866971efd5d3f6422e54fe44c8b5aa72555fdbca5c7e91113e795075909d

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    67680ac0a58a6119514b6b803f61ad2b

    SHA1

    051ccbbf99629b3d9ed5316459eba7ed6c7a0557

    SHA256

    2d5848c9638c90e3207cea28ff4ea0f56367ff38692c07d12d88c03016a5b82a

    SHA512

    d2988831cfab9545f6c2217aa9065d67ba22e1e7ab413783a3aad3a914a325fdddbe138e8e0ecba14a581a1ac8372aceac2f100eb34c1e17c704a71b13a07390

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    dcd6d8c7d08e0f978b861cd6833e7990

    SHA1

    7acc5fd2075dd0474186f732037d5dc0dfa334ce

    SHA256

    81551b4422f8c3cfb0024d67510e5c021d32660ece74472a3ab310511e46f02c

    SHA512

    d41931f625cb8aa0a13973e7a059f45075b765a415822b7a6d57ebb70b30cabd6508b9a93ef4ee80ac1f40b8299804de6f261c14f3ee5fbd839a16422fc81185

  • \Windows\SysWOW64\smnss.exe

    Filesize

    240KB

    MD5

    702f6a2f43cb92262c03c63de9681f87

    SHA1

    203241ee6c5b7d8b4a5757b81873fb924d8c4336

    SHA256

    089183dc8a5b18314d8470922fc22d6a997e94938a8de3ef42ef9e74ee5592f5

    SHA512

    89954cfa22830cd0c9d7762b4a41304dd546ddbc692b5017e985fefbbd104318cd68524571bd546f64a47526a4a46ba13a05dbd1bf6033e6ea5539c375ca77d8

  • memory/2520-32-0x0000000000320000-0x0000000000340000-memory.dmp

    Filesize

    128KB

  • memory/2520-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2520-34-0x0000000000320000-0x0000000000340000-memory.dmp

    Filesize

    128KB

  • memory/2728-43-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2728-47-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3048-28-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3048-27-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3048-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/3048-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3048-14-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB