Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/06/2024, 18:10

General

  • Target

    02b795b1508a79adad1321f7dc4304957f66b19a7ccb6f1f7b51be3a70af63db.exe

  • Size

    216KB

  • MD5

    102b222ef289a3791b9bd61bb46483f1

  • SHA1

    baf2de4b3a34e58740969ec40766090543a7c404

  • SHA256

    02b795b1508a79adad1321f7dc4304957f66b19a7ccb6f1f7b51be3a70af63db

  • SHA512

    ab2defc6cf100b482ed60e709aa124b6360643f700a03807754121dcb7e307c43aff814ed545489dae45153f02809da9fb481f6179bcb755a9eedd0102a527e5

  • SSDEEP

    3072:7vEfVUzSLhIVbV6i5LirrlZrHyrUHUckoMQ2RN6uBL9iT:7vEN2U+T6i5LirrllHy4HUcMQY6C9iT

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02b795b1508a79adad1321f7dc4304957f66b19a7ccb6f1f7b51be3a70af63db.exe
    "C:\Users\Admin\AppData\Local\Temp\02b795b1508a79adad1321f7dc4304957f66b19a7ccb6f1f7b51be3a70af63db.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3520
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:804
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:772
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2980
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3212
          • C:\Windows\SysWOW64\at.exe
            at 18:12 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
              PID:3524
            • C:\Windows\SysWOW64\at.exe
              at 18:13 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              5⤵
                PID:4220
              • C:\Windows\SysWOW64\at.exe
                at 18:14 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                5⤵
                  PID:2292

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          216KB

          MD5

          1938d08e8d1614104810da79d3e45f0e

          SHA1

          c9dc9a705fecbc916b1ab9d21e4923d2cc5ce278

          SHA256

          817236682d6b4a239c752571a5f97f42a22bd4988a9a2156a4a71de8f4c9a349

          SHA512

          6e7b7440fa11df406e4f0fad2f278d2f0d9472cf85f1a29e4c145cdbbceaf21dfe49950c02158d378d3a0a9f5f54fad3ee669c50703e44b8b7f664002d29fada

        • C:\Windows\System\explorer.exe

          Filesize

          216KB

          MD5

          aef81f7dda750578f853f246178a1966

          SHA1

          40998acf48492615c5dbcffa2345bc36daf0891d

          SHA256

          1b1e2dcb8cf0a680e5d619ce775fa960970f25c960cb0362bd598ac6b830e26a

          SHA512

          59a26e21a2dc9fd84c8f583112c3a9a006848a08e4a2122f970753ae5a4f81c826080a596b678f01e982c78c6759d4557bb33274bb371b2d30d5e4310b391801

        • C:\Windows\System\spoolsv.exe

          Filesize

          216KB

          MD5

          f34132b59d78424a607400f8a8cb7637

          SHA1

          2207692d07552a32e053cf6f9aa78bad12198aea

          SHA256

          ef21c73f2bb2a591bec580179f3749cf811cfc563dfbfdf52507ac505cbbeb39

          SHA512

          9d52f7b6fdb1ac564ac8a837e0a672234181279c3d9e94eeae627d56933c36faed875184d3251051e58302840faedd697fbd3144f429dcef5f65e16f1883ca54

        • C:\Windows\System\svchost.exe

          Filesize

          216KB

          MD5

          7c06372d1c30d5097e1308d28128dc49

          SHA1

          59c8c4153d7eb97c60081256e77c7218eee8024e

          SHA256

          b68ae3960c7a371e396a6033da6c193a297e209016a84096ff85961838db114e

          SHA512

          65a02d2ca9207c6a5824f8efaa653ba6b9c61681d47d6d6bc25f7bf4169dbd7401efca909672e268a7c2978ca00986039c35bf7f0954558e17370d11cb41900c

        • memory/772-16-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/772-36-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3212-33-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3520-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3520-37-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB