Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04/06/2024, 19:22 UTC

General

  • Target

    Setup (2).exe

  • Size

    12.2MB

  • MD5

    3770d31935ff5c06e00217dd6872f8a5

  • SHA1

    1bccbfc5e904e98aadb4900b4fd7a838988481fd

  • SHA256

    02a5539413662612285c1fb5308524a0580c5526b097fcae06c3cefe860c6aba

  • SHA512

    0209889c6a9a11d843163fa271850ff1cf83c067e810130e197d1bbe3955fc8b0291eaba0e3ec74eec47f4ecf403f367181589b89b3868737a517778f13d23a0

  • SSDEEP

    196608:CTcdu8+Fy1kYUd7VUIUo/mglLA1UPrzt4IjXTRqH4CstdCdTXf0Ibmy74g0i:Scdu3Fkk3d7PUo/mgpthjXTXtdaT8gF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup (2).exe
    "C:\Users\Admin\AppData\Local\Temp\Setup (2).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\is-3DDUT.tmp\Setup (2).tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3DDUT.tmp\Setup (2).tmp" /SL5="$40254,4629198,799232,C:\Users\Admin\AppData\Local\Temp\Setup (2).exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Users\Admin\AppData\Local\Temp\Setup (2).exe
        "C:\Users\Admin\AppData\Local\Temp\Setup (2).exe" /VERYSILENT
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1028
        • C:\Users\Admin\AppData\Local\Temp\is-IOK3G.tmp\Setup (2).tmp
          "C:\Users\Admin\AppData\Local\Temp\is-IOK3G.tmp\Setup (2).tmp" /SL5="$50254,4629198,799232,C:\Users\Admin\AppData\Local\Temp\Setup (2).exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          PID:5036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-3DDUT.tmp\Setup (2).tmp

    Filesize

    3.0MB

    MD5

    eae4c9da7c6bd5d4d529fe98a3796856

    SHA1

    395e1b5cad44f2136c38ac9b64b726649a9cb33c

    SHA256

    0bff7f7d82d0e5950892f7bc349b1ea6f000122de195144643084652153457fc

    SHA512

    ab2cbd4c1c34b608989fab83d2ce5e847445778985621790bad3fe0b16772017614c788b4ef66d60330f3e04508fcf27da0279f99fefb31330ffe9934612ef23

  • C:\Users\Admin\AppData\Local\Temp\is-VQR89.tmp\_isetup\_iscrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • memory/1028-13-0x0000000000400000-0x00000000004D0000-memory.dmp

    Filesize

    832KB

  • memory/1028-15-0x0000000000400000-0x00000000004D0000-memory.dmp

    Filesize

    832KB

  • memory/1028-37-0x0000000000400000-0x00000000004D0000-memory.dmp

    Filesize

    832KB

  • memory/2080-8-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2080-17-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2332-0-0x0000000000400000-0x00000000004D0000-memory.dmp

    Filesize

    832KB

  • memory/2332-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2332-19-0x0000000000400000-0x00000000004D0000-memory.dmp

    Filesize

    832KB

  • memory/5036-27-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/5036-35-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.