Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 05:00

General

  • Target

    f60205ecb21a0989b2e7acc9bca276f58ae38d77ccb250b8059af4f46c5f36e8.exe

  • Size

    12KB

  • MD5

    84c3cde186f5ce9e444c3080f4c02c94

  • SHA1

    fa37fb0c8266c8576e68aeb756ba514b9361e066

  • SHA256

    f60205ecb21a0989b2e7acc9bca276f58ae38d77ccb250b8059af4f46c5f36e8

  • SHA512

    6dcda0b1d97872d01ee00617406aa20197f75008b56f3975da128d22477bc72501503b04e95187b43c45c1a66437e220e35bda7ad7696678c1d8e8b77e3f5dec

  • SSDEEP

    384:oL7li/2zHq2DcEQvdQcJKLTp/NK9xafy:WbMCQ9cfy

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f60205ecb21a0989b2e7acc9bca276f58ae38d77ccb250b8059af4f46c5f36e8.exe
    "C:\Users\Admin\AppData\Local\Temp\f60205ecb21a0989b2e7acc9bca276f58ae38d77ccb250b8059af4f46c5f36e8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sflr4ukt\sflr4ukt.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2FB8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBE0EE998821434BA41376307BF8F2B9.TMP"
        3⤵
          PID:2628
      • C:\Users\Admin\AppData\Local\Temp\tmp2E04.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp2E04.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f60205ecb21a0989b2e7acc9bca276f58ae38d77ccb250b8059af4f46c5f36e8.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        PID:2748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RE.resources

      Filesize

      2KB

      MD5

      291ce671e59dd15cd582a80bf5f766c0

      SHA1

      90a82ccfed533d1fdbc118e9706bb8eac1c5cdd8

      SHA256

      a9226b442476c16fb6224c02d6e88578f4f415db61355381fcc12c702217e253

      SHA512

      c2c55b7501910dbf2af09a0e7e4349b40728709151c5e645b158e1d7ec9f29251cabd9ff71c62a6b79c8690c7bb73e2cb086d6f896f21a67a62bce293a590997

    • C:\Users\Admin\AppData\Local\Temp\RES2FB8.tmp

      Filesize

      1KB

      MD5

      2229fdecbf134a2e101cc3f078e8f8b6

      SHA1

      a659e1b5e9f43334745f43bde089afd73c72e2ab

      SHA256

      c3e6943d1a939c4920110310978892d6e5ebb4c3d999e6c50701ce643f2bee61

      SHA512

      762d8f21ff4ea13618866533188a4090f78d0fdc2186832907592301cc3d575c8a18c2d4387545143ebd091f0bc130cbc779c50f66bb3ee4525f677143d44234

    • C:\Users\Admin\AppData\Local\Temp\sflr4ukt\sflr4ukt.0.vb

      Filesize

      2KB

      MD5

      c8dbd612fdbaf98e936d6940e4fb9d08

      SHA1

      187b6e0f04ce21596e707486b204ac489e26e785

      SHA256

      9a3b20fdedf220e1a40fe1fffb3ab1b37e1f19bd4b4fc08c363f86f7e328db04

      SHA512

      c5489088f399b2eba801c4efe85b4961dccf4b48fda22ea83a9edd80c6977f6e7899fa613a05d84f0b49b2ddfcbf1bc4244d1ebe0b0d1f3db69f782add606cf1

    • C:\Users\Admin\AppData\Local\Temp\sflr4ukt\sflr4ukt.cmdline

      Filesize

      273B

      MD5

      de092c740dc1070b118ff0e094964fce

      SHA1

      335dbd5cd5bf8482d8ae03d39235873ca9d22a37

      SHA256

      2e616f601ae89b04f4ed2a9d9cad510c2be75df27aa25a393cbf501707d45ef0

      SHA512

      5a410bc1f9a47471c1d5baa6016fd151eb12eb6410a0743492264e7f18b1c3b80e79721244f6f74227665e8e6313158473335a49612c1db98be9feb506e53756

    • C:\Users\Admin\AppData\Local\Temp\tmp2E04.tmp.exe

      Filesize

      12KB

      MD5

      8ea3c2be266b52a982dc87c94e62f19b

      SHA1

      1ec71ba857d3f4102e6aca6587dcaca9f9febb39

      SHA256

      0cdfa6af2d3b2ad2bc19626e00a7492efe57d46d5ab36a97f8a3fdfe5914cc1a

      SHA512

      87936efff4da2d9c55539477325cdfcc8fc1dc6e19bcfb7d18970fc1d9e2cf3265f6ead142c06f49bfef9d6053b88ee733efbcc9c22ba0b71a7297eae784cd50

    • C:\Users\Admin\AppData\Local\Temp\vbcBE0EE998821434BA41376307BF8F2B9.TMP

      Filesize

      1KB

      MD5

      f1c6c106a6d315ab51cceb34d8089259

      SHA1

      9f8ca5cd130df05b8974a61e2fe95d146f313a65

      SHA256

      4214e4789420f635ef8f9dde50bce4a6e8095aec182c1ee448a9b053bced91f1

      SHA512

      1e3f9aa068bb6840d71117ed03803ee5657869a611ce6b2ef419162967d4a7f0bfc0a8576e46314baa151aac1665417c08b32f180ee5bd57fb984f76e4e5ba59

    • memory/2036-0-0x00000000746FE000-0x00000000746FF000-memory.dmp

      Filesize

      4KB

    • memory/2036-1-0x0000000000E90000-0x0000000000E9A000-memory.dmp

      Filesize

      40KB

    • memory/2036-7-0x00000000746F0000-0x0000000074DDE000-memory.dmp

      Filesize

      6.9MB

    • memory/2036-23-0x00000000746F0000-0x0000000074DDE000-memory.dmp

      Filesize

      6.9MB

    • memory/2748-24-0x0000000001180000-0x000000000118A000-memory.dmp

      Filesize

      40KB