Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 00:46

General

  • Target

    918eab8e1de86f38d83f66d97a3e9f26f76ab0ec54feab43540d50c29fa05f77.exe

  • Size

    12KB

  • MD5

    a37b639c3d3d15621d92412478f20e2c

  • SHA1

    f066f7587fff6236fc02659774c64da23f5ff382

  • SHA256

    918eab8e1de86f38d83f66d97a3e9f26f76ab0ec54feab43540d50c29fa05f77

  • SHA512

    1264463ae943f3ee0ad75df3777f4b5ed0cb3acbc879cb0fd3243573449a29d6e99e92f85a8887cdff1dcea7b5e285857a1bb5d6d6a248e4c7c886a692bd10d2

  • SSDEEP

    384:DL7li/2z4q2DcEQvdhcJKLTp/NK9xaWN:H0M/Q9cWN

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\918eab8e1de86f38d83f66d97a3e9f26f76ab0ec54feab43540d50c29fa05f77.exe
    "C:\Users\Admin\AppData\Local\Temp\918eab8e1de86f38d83f66d97a3e9f26f76ab0ec54feab43540d50c29fa05f77.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\v5dkadon\v5dkadon.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:344
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2F79.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB3436AE08E984FAB906DF0ABC09BCCC5.TMP"
        3⤵
          PID:2856
      • C:\Users\Admin\AppData\Local\Temp\tmp2D97.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp2D97.tmp.exe" C:\Users\Admin\AppData\Local\Temp\918eab8e1de86f38d83f66d97a3e9f26f76ab0ec54feab43540d50c29fa05f77.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        PID:2068

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RE.resources

      Filesize

      2KB

      MD5

      101f6df53cb3906ef5ff6e363b85bc00

      SHA1

      d675309c58843211e38da26d516c9a97060be112

      SHA256

      fa06cb6dfdbc7db828e6483378d209074034d017926a3ba72fba0a18973aa89d

      SHA512

      d9daef95c9d2dfa6c24bbe82002d396ccc42a8b8cde08c0007e63bd875491a2054f2b64f8a105a0ab064c09f087b16e28cba7a3104fd784e000be1cf4deef321

    • C:\Users\Admin\AppData\Local\Temp\RES2F79.tmp

      Filesize

      1KB

      MD5

      9062812f62820f2eadeff03226bfa277

      SHA1

      ead38d3ca72994614fa63a7fb4925be1953ddb69

      SHA256

      0d9cb3ba11c3e6837cc468d00a526cc72410ce72a68eca97e18f896e138cf914

      SHA512

      f1a7d695cda9921107758e7c5c9b8a11a1259f8ff48a388330ede939f132c9e7d1edccd1eac89aa193cffc451ed98932b8d4cc0e9d47a800d00baba6afee8757

    • C:\Users\Admin\AppData\Local\Temp\tmp2D97.tmp.exe

      Filesize

      12KB

      MD5

      2eef84ea5bbc93999a1ab8fa717b8f78

      SHA1

      a70bf36e4cdb7ce1b46bc9c86ff274517b025223

      SHA256

      89b9756cbd743e18ce1d82386a83379cd239d7056a82f837fe4345535f92ac0f

      SHA512

      809597976c3bf29b32fa511508282af919ccb0b5537ec135b555e99daebd8c94d66f237a81fbde4a0c2741d4f490f543122cbc55f340fc91aeda486ae8fe3e04

    • C:\Users\Admin\AppData\Local\Temp\v5dkadon\v5dkadon.0.vb

      Filesize

      2KB

      MD5

      58abf337d148e7691fd75199a71745d7

      SHA1

      68d2bd869b6064f737b8dc3c3c8b705c85944bce

      SHA256

      51f7898353faa9f30c7f681b601630981e446ab2146149123f973e598cd4dd92

      SHA512

      7dab2b16649694c62b5edb8c3742ba1b761f38369cb9897ea665b4b4eca0d31e25eaefcc74e94050832886c038a6675c5e6c89e4d2fea6e065b529cd53e4fc68

    • C:\Users\Admin\AppData\Local\Temp\v5dkadon\v5dkadon.cmdline

      Filesize

      273B

      MD5

      879ad86387ce372c6f9705651453509a

      SHA1

      0545201b8aa483a487a1612a15b48e68a7406ece

      SHA256

      0a17701d162171af678df9f68724b1cdd7a3f7c1aacfc436241cb946241a70fa

      SHA512

      f78dd8b66d88297db2e1e517f4646cd08b3172e9980bc140ec0d9fc8ab0357a7d5ba89316a2e0b6618f4eddfabe5adfe5934d90799d50e2cecebfd49ca163d87

    • C:\Users\Admin\AppData\Local\Temp\vbcB3436AE08E984FAB906DF0ABC09BCCC5.TMP

      Filesize

      1KB

      MD5

      00531b0b4e4cfeb472c07daae216ac8f

      SHA1

      40183559cf29c746a6f2daf690d19a401e6beb23

      SHA256

      54c70ce84952ef7d01236a4989763fa9eb765bf2be4ba40d0fb4e4294223c124

      SHA512

      5d0f65ee35bfa202e3b43bad2137fdc4cbe5d8a46c6e5315c4362dfefd68486431051af6f5f610b3b9ed13e5aeb1218615fd0441eadb57a371c09f74a813d483

    • memory/1252-0-0x000000007434E000-0x000000007434F000-memory.dmp

      Filesize

      4KB

    • memory/1252-1-0x0000000001150000-0x000000000115A000-memory.dmp

      Filesize

      40KB

    • memory/1252-7-0x0000000074340000-0x0000000074A2E000-memory.dmp

      Filesize

      6.9MB

    • memory/1252-23-0x0000000074340000-0x0000000074A2E000-memory.dmp

      Filesize

      6.9MB

    • memory/2068-24-0x0000000000EC0000-0x0000000000ECA000-memory.dmp

      Filesize

      40KB