Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 22:49

General

  • Target

    74370c4b2b556b4b16ae624372e76569db0897c0e37a92e2f89e47a41b485f3d.exe

  • Size

    576KB

  • MD5

    bea0d99a6a226473a4dfb1e382fe55c1

  • SHA1

    43d4e4458af4a61c367eafb66851cf0a5975b892

  • SHA256

    74370c4b2b556b4b16ae624372e76569db0897c0e37a92e2f89e47a41b485f3d

  • SHA512

    200c0d63db140112a540daccabe9907ff83a6470e663a404b267e6cc0ed4ecd1e544dcb0b7f980eb0a1e21248e5a4d1ebbc888380a25438806d520fa001af95c

  • SSDEEP

    12288:AmWhND9yJz+b1FcMLmp2ATTSsdxmWhND9yJz+b1FcMLmpG:AmUNJyJqb1FcMap2ATT5rmUNJyJqb1Fl

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74370c4b2b556b4b16ae624372e76569db0897c0e37a92e2f89e47a41b485f3d.exe
    "C:\Users\Admin\AppData\Local\Temp\74370c4b2b556b4b16ae624372e76569db0897c0e37a92e2f89e47a41b485f3d.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0cedf6a806eea7d6a5199e0d3a735659

    SHA1

    2eefc0abd6b57e0598a9bf604d713de69335d6ea

    SHA256

    c6b03400f6ad5c8a1dde30c5a4bf25733364bdc978301b343ee8bf4da1af542d

    SHA512

    095d9f9230aaeda6e6ec6d1c11e59a7fc0ab7e345c2c28ce58b1e275f9e9547dd52dfbe58c87c4ff0590ce3181fd30e0a4a77cca44b271e73f4937a32010807d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3520576abf7388602e25300c2b60801

    SHA1

    31d6d16264045a6408b2b914f8d1e196ac531b4c

    SHA256

    7354668c7e169b878164eeb8ef2960c2deabd6a07296fd612d900ee5b67eff72

    SHA512

    41b61c7886c2844dfc23810cd0c4de89c5210caca808a633d522f5b6a06a154311c798eeb852f1d1ff7c4867c4486a30c596967e62d8ea57739e5616db39c687

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    34dd0d38aeb8040fb24fb0122e185454

    SHA1

    82e82be56868862d6d39fb674dd59eaa8d287d6a

    SHA256

    93da7e64f108bd6a76a07bd9f04c8fca7328fc2faccced10808808cbe1234288

    SHA512

    5c763783e7a70b827b5a516d32403819b46933b78dc7e839f2c1f83d117aa6a0d3d5c2aa7a6cca290cbe11b8bdb5acf15227f9713e09a172e6fe86775f55329b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\login[2].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\1E20.tmp

    Filesize

    42KB

    MD5

    e2601a2c7044cf5184a1e53bbde2e5fc

    SHA1

    3c2a3d9dcc8175464196f995bc2d78ea56d10473

    SHA256

    88dd2783dc861fc06d5df44cdd7afc40d9d70279bcc288c827c2e8f6cc1e9cd4

    SHA512

    37bb62aca251902b3a9c1f701edbaf5299feb34272652459ed9f8c4ef7c8253dde61b2f8b2397f772856d3fa883c17f5f81bc3a3a1e1813dc6601cec7f446a67

  • C:\Users\Admin\AppData\Local\Temp\2C9A.tmp

    Filesize

    1KB

    MD5

    a45b37348a6a9fed8468ced5f4be42e0

    SHA1

    55d412f28caeda5b1c771b51136c1c9f11f12f7e

    SHA256

    ce1bb35bc20cbc51c0111358d5e434ac44d173d6ff7b986ee9cf86b6ed906104

    SHA512

    95064217849c7dcaf4e5f6ab2f26a4e49b65ba22d4d6eab61759cc9f8c6775d702fa28192b7791b1e6ca6d7aea94c2f4694e6e4586cbce0d25efad9ad4aab03b

  • C:\Users\Admin\AppData\Local\Temp\873B.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\CabDC00.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarDCAF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\TarDD9F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\AppPatch\svchost.exe

    Filesize

    576KB

    MD5

    37d7f19bb7e58e451876c5fb114f240c

    SHA1

    e9328d06aabcca83c123749a5a8af25e77262ae8

    SHA256

    3c173f06a6a44eb851ba43fd070fd97b36fc8eac9ef5da228d6ab860c153c687

    SHA512

    54c0a6d2bc8424e378df7387eb9a6928d81ba4e1b574bd07e85d293480dcc738ad7bef054c8e88dcfb72d52bd8065afb5842c8a34fa7db0bd585ddcf81811915

  • memory/2196-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2392-61-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-50-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-32-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-34-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-51-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-77-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-76-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-75-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-74-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-73-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-72-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-71-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-70-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-69-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-68-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-66-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-65-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-64-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-63-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-62-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-29-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-60-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-59-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-58-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-57-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-56-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-55-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-54-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-53-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-27-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-49-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-48-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-47-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-46-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-45-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-44-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-43-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-42-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-41-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-39-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-67-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-38-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-37-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-35-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-52-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-33-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-25-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-18-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2392-22-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2392-24-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2392-20-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2392-16-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2392-14-0x0000000002230000-0x00000000022D8000-memory.dmp

    Filesize

    672KB

  • memory/2392-31-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-40-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-36-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB

  • memory/2392-190-0x00000000023E0000-0x0000000002496000-memory.dmp

    Filesize

    728KB