Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 01:19

General

  • Target

    6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe

  • Size

    1.9MB

  • MD5

    1e4ab972a4f5977387011437c4dbe618

  • SHA1

    a7c033be7d29c03c4d617d6268637341a827f12b

  • SHA256

    6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220

  • SHA512

    bb4e5c26bc68007b343974e9e6687c3b51613b191b4a6f58a9ceec8ffb4ed2fca2e6172b3f601ec5bd94a540846c12348811ab6eefdf046973209b54abbcdecc

  • SSDEEP

    24576:GkXbZMzUN+ZysTspK8kCBHcdjW1kMrLbgBwnRTvOksAhyTDc/VkTJSML2crAM0aI:jskL1LrLb52kmTD6oJSsrAMgduf8hMs

Score
9/10

Malware Config

Signatures

  • Detects executables packed with unregistered version of .NET Reactor 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe
    "C:\Users\Admin\AppData\Local\Temp\6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Tuv5MiIr10.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2620
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:2696
          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe
            "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2612
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qlEmwzstBs.bat"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1460
              • C:\Windows\system32\chcp.com
                chcp 65001
                5⤵
                  PID:2724
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  5⤵
                    PID:2628
                  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe
                    "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2864
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HqVvjk53aP.bat"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1528
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        7⤵
                          PID:840
                        • C:\Windows\system32\PING.EXE
                          ping -n 10 localhost
                          7⤵
                          • Runs ping.exe
                          PID:1764
                        • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe
                          "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2796
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\U9jP4iZUUm.bat"
                            8⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3060
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              9⤵
                                PID:1244
                              • C:\Windows\system32\w32tm.exe
                                w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                9⤵
                                  PID:2316
                                • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe
                                  "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"
                                  9⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:1148
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3IMqqsTTOd.bat"
                                    10⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2788
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      11⤵
                                        PID:880
                                      • C:\Windows\system32\PING.EXE
                                        ping -n 10 localhost
                                        11⤵
                                        • Runs ping.exe
                                        PID:568
                                      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe
                                        "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\taskhost.exe"
                                        11⤵
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2344

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220.exe

                    Filesize

                    1.9MB

                    MD5

                    1e4ab972a4f5977387011437c4dbe618

                    SHA1

                    a7c033be7d29c03c4d617d6268637341a827f12b

                    SHA256

                    6c23d186a8ad288a8d3bedb26ac3351d4dd8350b84acbaa163afd30d561dc220

                    SHA512

                    bb4e5c26bc68007b343974e9e6687c3b51613b191b4a6f58a9ceec8ffb4ed2fca2e6172b3f601ec5bd94a540846c12348811ab6eefdf046973209b54abbcdecc

                  • C:\Users\Admin\AppData\Local\Temp\3IMqqsTTOd.bat

                    Filesize

                    203B

                    MD5

                    34005ba5e4cab9e54eab2010f092d7b5

                    SHA1

                    c6bd917ed46c00ee729af0e5485567c7b75fb04b

                    SHA256

                    19129cf5c9c8107ac5862ae050744ae2a8bf56b440033cac76654746fcfd3e6e

                    SHA512

                    44e9fd5239e8a2bd266066cfb7679be4cd4ca7f12aafee583f7973c92346fcc082b705ebe40befd8ad1eb72c0af05b49a048236d0852754d6791804988c78db7

                  • C:\Users\Admin\AppData\Local\Temp\HqVvjk53aP.bat

                    Filesize

                    203B

                    MD5

                    87f878afcc779f28b3b15de83d210e3c

                    SHA1

                    2623eabd9463b1935175f7e6f3d091d002849159

                    SHA256

                    025414b7edd285cb1eb5200f7231f540c837fb72952e12a619879d9f080ae2bf

                    SHA512

                    11e7f50b4a9adcba93f847415806b7af7867b45625f4106f2522de69385e026d0ae83f2e0a4a972e3c077c7862584858bcea6b4ef6f840740d0a4df866855eee

                  • C:\Users\Admin\AppData\Local\Temp\Tuv5MiIr10.bat

                    Filesize

                    251B

                    MD5

                    7fbd1b3c88a5e533861935e489240392

                    SHA1

                    af17d3d0e968a9da241c981ab208d1ca60250a1b

                    SHA256

                    4e3c025b6d7650dfef7e0cf09b615a2cf77a4e3cec63f0949200ae0501fa9b99

                    SHA512

                    17d8c810fb9347aaca257a140282b4522d5e29b2c9776feffc544170b3e3288f0d7a3e1b0709f9e76a5013b4f42c17f4fcb2e803162443df7e237be8b3cb6467

                  • C:\Users\Admin\AppData\Local\Temp\U9jP4iZUUm.bat

                    Filesize

                    251B

                    MD5

                    803d0a47381869b1d4f21c171c9967c4

                    SHA1

                    549df33ea9a91d187a4cde7ef65fb48a9be2678e

                    SHA256

                    8ab8d111763410f22bfe8eb058b57f0bc2053d40ffbf4e4359b644562acf0fc9

                    SHA512

                    f9aea4d11d2d524249a59bd03cf8094c5ea450377e90423e376fbe21e00b5a03b53a03df557209532d7d672fc75b04110f0c77d746127c5ecc616b25f612c071

                  • C:\Users\Admin\AppData\Local\Temp\qlEmwzstBs.bat

                    Filesize

                    251B

                    MD5

                    4ec58dd64f41f665f6910968ff628820

                    SHA1

                    ec2b6951c5e1de51ac27b0a782063a381c71d295

                    SHA256

                    4d6e56f6aac4b044d11dfb6f602d186cd2cc7cb70f479a2b13474f76cec17e76

                    SHA512

                    3308b087c68bb7001ea0bba2221ca3b01926c27a11650099981952e3e03c3039dc42893d6a63dc3462ddd4c8e71038f18d51dbd173b15d7a2330829d1ed5e35a

                  • memory/1148-75-0x00000000001C0000-0x00000000003AE000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/2344-87-0x00000000012E0000-0x00000000014CE000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/2796-62-0x00000000002A0000-0x000000000048E000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/2864-50-0x00000000013C0000-0x00000000015AE000-memory.dmp

                    Filesize

                    1.9MB

                  • memory/2984-11-0x0000000000690000-0x000000000069E000-memory.dmp

                    Filesize

                    56KB

                  • memory/2984-14-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-17-0x0000000000820000-0x0000000000838000-memory.dmp

                    Filesize

                    96KB

                  • memory/2984-19-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-20-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-15-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-9-0x0000000000680000-0x000000000068E000-memory.dmp

                    Filesize

                    56KB

                  • memory/2984-36-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-13-0x0000000000800000-0x0000000000812000-memory.dmp

                    Filesize

                    72KB

                  • memory/2984-18-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-0-0x000007FEF5CA3000-0x000007FEF5CA4000-memory.dmp

                    Filesize

                    4KB

                  • memory/2984-7-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-6-0x00000000006A0000-0x00000000006BC000-memory.dmp

                    Filesize

                    112KB

                  • memory/2984-4-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-3-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-2-0x000007FEF5CA0000-0x000007FEF668C000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2984-1-0x0000000000390000-0x000000000057E000-memory.dmp

                    Filesize

                    1.9MB