Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 01:25

General

  • Target

    5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe

  • Size

    54.0MB

  • MD5

    8583a7539b74e8223d479f70c6b2de51

  • SHA1

    b0c2427c0899c20b725b85dff1126a696c372857

  • SHA256

    5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83

  • SHA512

    2434db81b7356e1ded0b86d80b29fd87449225283f5d59313bb875107548b46d1c2513a92a0392cae0ec5aef01a135fd9c91fe7863df0634b0858bf85f7100dc

  • SSDEEP

    98304:xDr5t+zSg6zFhQdQBFgtD75qFb0I+0PqkW:xvzTvQdQsD7sbS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe
    "C:\Users\Admin\AppData\Local\Temp\5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe C:\Users\Public\Music\RBRBRA
      2⤵
        PID:1208
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Public\Documents\M2M2L5\lee_yeon_woo.hwp
        2⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Public\Documents\M2M2L5\lee_yeon_woo.hwp"
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:820
      • C:\Users\Public\Documents\M2M2L5\TASLogin.exe
        "C:\Users\Public\Documents\M2M2L5\TASLogin.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Users\Public\Documents\M2M2L5\TASLogin.exe
          C:\Users\Public\Documents\M2M2L5\TASLogin.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

      Filesize

      3KB

      MD5

      f3ed3b68070c5211b794e743c946c8e9

      SHA1

      b11697ae040ace0081f8666a5c97317c0ec04b80

      SHA256

      93b304ba1a4228a8a5fa43f551f6cd53cfea85bb2cd4d8d7261f918539a21304

      SHA512

      44fdc80e238c5e1dd614cc5c7a99e5ee59cae94328eaba7cc70091b24792cfb8f9d927f0e98ea8ca6cb91b821117ccc2d95039a62980689deff2524a3f646bf0

    • C:\Users\Public\Documents\M2M2L5\TASLogin.exe

      Filesize

      567KB

      MD5

      e6a3caccbd9ca82f38a14bd0d4428240

      SHA1

      63937051b04582255505261d512a80ab40513b5f

      SHA256

      ca1f26619b4483f4bda6b4d352b58a9c4f30c2e985e62e761b7d6f3440922264

      SHA512

      21fbc87528dbc6b0f4aee165d9b812595ad1d30af434c401f4bc86d8bd6a209da950523cf00e7ae5fb1676350cd299d96e0e7a0255e6ebf53aeb7e51dd5d133e

    • C:\Users\Public\Documents\M2M2L5\gii.png

      Filesize

      317KB

      MD5

      dba8607e46cceda5dd57916a6bd8c7c7

      SHA1

      c99c80cb5d46035b05a7dedb6e7d22946ce2dd94

      SHA256

      8b44645c0bec9179cbb8ffd027395127d81ecc3b3ac5271b29e5221bc88ce10f

      SHA512

      76dedd75107e24dabf30893a720af642e49c513a5a1ec80d5c9cb1baed8c7f29023455cf3aa75a5f7de90b542dec6d13490a03d482755a8d301402e5914dd9af

    • C:\Users\Public\Documents\M2M2L5\lee_yeon_woo.hwp

      Filesize

      130KB

      MD5

      ebe2802b6afa5a08bcd83f8d5202fbc6

      SHA1

      7018f7332d98781236c3abc10097dae7dd53bb1f

      SHA256

      c074b60774ca11085dcd7f34772f2979769dd9ae38b0766fa7b829bb68d02a4a

      SHA512

      fb6d29a5889d2335ad348dfb772f2aa0d34caef4d0955c2924ad1bb1207ed24a06555341ad206ff10a035600a4299c0429952d6fc1305aebf2c82054628d6ed3

    • C:\Users\Public\Music\RBRBRA\7QAQAQ.url

      Filesize

      131B

      MD5

      1723ff9bbf9edecc53680d36b708452d

      SHA1

      7c0610ee41074447cb53f610afdf08e9acd794cc

      SHA256

      b77580838ea8e5fe7f81cce3bdef9638fa373e33e76545c6f0bdf73b47db1b12

      SHA512

      c79d588660a08464f1ae43e268e5ad5783326d7f9687640542cee376d057939d01770bf29645e6ce889549a170ba83b5e2a5d47e4000d6fe832c99d9b69fd2f5

    • C:\Users\Public\Music\RBRBRA\YHXH0H.url

      Filesize

      135B

      MD5

      b90ae5927771b170a911f043e4a2f6db

      SHA1

      284a12348b2a37c6e645e12c2528ee4134f1cb70

      SHA256

      f7bad0a6bdb97fbf2d1446475012db818bb65e0b26040628cfed5cdcfbcb571e

      SHA512

      1681be3c030e5d42fdd2857d4121e26df5cf5a8119506849d395dbb0a117708b5518732e47dcc1478742aa247fe46f1c7ffea9f1d0aba3bd67d7600529d11d68

    • C:\Users\Public\N63M2M

      Filesize

      2.0MB

      MD5

      49ca5d6fb817f9af89284dc0be61a1cf

      SHA1

      7b3d00869d8fb0266783250046ba0c11cf45ce18

      SHA256

      072eafa9fb2840f6588abe7b6c992d89192609996da4579951de4a0f4afec6c0

      SHA512

      ca1a3fb0f164e74d58ee190ba31a7bc6d8ef50c4ab63ed6f8ebcbd7df339a1de2aa6393eb694e288ab32b32668413331cf86d6ee0e06ecad1a838498bbf4946d

    • memory/268-54-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/268-89-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-97-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-59-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-57-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-95-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-55-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-92-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-65-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-63-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-64-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-91-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-83-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-60-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-86-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/268-87-0x0000000000400000-0x0000000000493000-memory.dmp

      Filesize

      588KB

    • memory/2172-17-0x0000000003A90000-0x0000000003AA0000-memory.dmp

      Filesize

      64KB

    • memory/2432-85-0x0000000010000000-0x0000000013601000-memory.dmp

      Filesize

      54.0MB

    • memory/2432-50-0x0000000000400000-0x00000000004EB000-memory.dmp

      Filesize

      940KB

    • memory/2432-62-0x0000000010000000-0x0000000013601000-memory.dmp

      Filesize

      54.0MB

    • memory/2432-61-0x0000000000400000-0x00000000004EB000-memory.dmp

      Filesize

      940KB