Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

16/05/2024, 17:46

240516-wcl8hsgd53 7

16/05/2024, 17:40

240516-v9a13sgc23 7

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/05/2024, 17:46

General

  • Target

    felipe.exe

  • Size

    152.7MB

  • MD5

    19ce72230b3b6bfd9d879d32bb392684

  • SHA1

    1ab8028bd918aefdc91570f933f93d5548324601

  • SHA256

    91eee2b2dea04bbc78c9bbccf05b3698e0a12f691cce42986e16db0ab10e853f

  • SHA512

    03da8b5fbef54f3b2aeeead91a0a0550e153b9e523835933a2ca9876f8000fba7f0cc5fc632ed83c4d4dc5a1c1d9443416eaeed5b478dbe862cf608cf074f284

  • SSDEEP

    1572864:KLBZB52nvuZ7wVuMbgR7Sp6kYdEctmhoLsPagBsgkx52HYhwj+vfIBUdoJnP9Dj0:KypCmJctBjj2+Jv

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\felipe.exe
    "C:\Users\Admin\AppData\Local\Temp\felipe.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4336
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:2340
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
        2⤵
          PID:1272
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:512
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4304
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4156
        • C:\Users\Admin\AppData\Local\Temp\felipe.exe
          "C:\Users\Admin\AppData\Local\Temp\felipe.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\felipe" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1792,i,12122784930836182014,15052828861708891471,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
          2⤵
            PID:2848
          • C:\Users\Admin\AppData\Local\Temp\felipe.exe
            "C:\Users\Admin\AppData\Local\Temp\felipe.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\felipe" --mojo-platform-channel-handle=1848 --field-trial-handle=1792,i,12122784930836182014,15052828861708891471,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:504
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1824
            • C:\Windows\system32\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:1780
            • C:\Users\Admin\AppData\Local\Temp\felipe.exe
              "C:\Users\Admin\AppData\Local\Temp\felipe.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --user-data-dir="C:\Users\Admin\AppData\Roaming\felipe" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 --field-trial-handle=1792,i,12122784930836182014,15052828861708891471,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:788

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            3KB

            MD5

            900713b658f108100bb7aa144134dbca

            SHA1

            7a05dd4d5cd03542c5187c8a3036f30b9d79daf0

            SHA256

            c59ad3c5b09e5adab5c6d20e70fc87edce830a1e696ea2b49b51fe99ae084da8

            SHA512

            85a5b109a01035e1ac4dec839f6b84bd6a141c6938e51f78915748a9a593b011367f1d8c7c72060a986f993ca3206fde30929b18be8d51d60cc1525a73613f8d

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

            Filesize

            2KB

            MD5

            c373cdb8236bb363319af570bd628dfc

            SHA1

            4f756c7d4a6f6e8494bd884bb9e00646e84e119b

            SHA256

            68d7a477b2bc5a4bf0f3894860999fa442a5b8653579f8173391dcc43dcbaf47

            SHA512

            cf8b041f6bfa9608191750a577bd86573656a017af61882db73f3e1f639411855038e3b761965cf04b26a0c0bbec1b6320482e787b7d667e0450c8ffb9ef1ee9

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sqqzjwsl.2me.ps1

            Filesize

            1B

            MD5

            c4ca4238a0b923820dcc509a6f75849b

            SHA1

            356a192b7913b04c54574d18c28d46e6395428ab

            SHA256

            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

            SHA512

            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

          • \Users\Admin\AppData\Local\Temp\1c53bbc7-b9f5-4cf8-8e54-f33d420e9eb1.tmp.node

            Filesize

            137KB

            MD5

            04bfbfec8db966420fe4c7b85ebb506a

            SHA1

            939bb742a354a92e1dcd3661a62d69e48030a335

            SHA256

            da2172ce055fa47d6a0ea1c90654f530abed33f69a74d52fab06c4c7653b48fd

            SHA512

            4ea97a9a120ed5bee8638e0a69561c2159fc3769062d7102167b0e92b4f1a5c002a761bd104282425f6cee8d0e39dbe7e12ad4e4a38570c3f90f31b65072dd65

          • \Users\Admin\AppData\Local\Temp\aab4e4ef-2120-4658-8218-9f87946c8209.tmp.node

            Filesize

            1.8MB

            MD5

            66a65322c9d362a23cf3d3f7735d5430

            SHA1

            ed59f3e4b0b16b759b866ef7293d26a1512b952e

            SHA256

            f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c

            SHA512

            0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21

          • memory/512-91-0x000001BD5D220000-0x000001BD5D25C000-memory.dmp

            Filesize

            240KB

          • memory/4156-142-0x0000023970B70000-0x0000023970BE6000-memory.dmp

            Filesize

            472KB

          • memory/4304-27-0x0000021247320000-0x0000021247342000-memory.dmp

            Filesize

            136KB

          • memory/4304-524-0x000002125FB70000-0x000002125FB92000-memory.dmp

            Filesize

            136KB

          • memory/4304-493-0x000002125FB70000-0x000002125FB9A000-memory.dmp

            Filesize

            168KB