Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    36s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 15:43

General

  • Target

    SQLi Dumper v.9.7 [Cracked By PC-RET].exe

  • Size

    3.0MB

  • MD5

    1f121b5cd0526ce9b1a3ddf3414693c0

  • SHA1

    1091a21b1cbb670e9a9a3c7add5239e53659159e

  • SHA256

    ef2cdcef2ad200acb11aa28ff753ac53bad2559e01b4c15022ce0265dc1107b8

  • SHA512

    ea044a01a4f29a2f76626c4f2680ce26d9f4b7453d557c95604305854969a2caa0f029bdc832984851978a8c156bee879589d80e46951a1844fb3180467a073b

  • SSDEEP

    49152:XTH0TmAiumuCcLeYomvrveaULQ0Gi1ltdpEPU4aZn:XTH0TmAiumuC7YvrveaeQdYTniU/

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SQLi Dumper v.9.7 [Cracked By PC-RET].exe
    "C:\Users\Admin\AppData\Local\Temp\SQLi Dumper v.9.7 [Cracked By PC-RET].exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://bhf.io/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2704
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:1668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Cab4AE6.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar4BD9.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\SkinSoft\VisualStyler\2.4.0.0\x64\ssapihook.dll

      Filesize

      67KB

      MD5

      8b003c3f98f8d08968ac5d3c1cc90a60

      SHA1

      68f8d418638a81839a2ad665909916cda8efe625

      SHA256

      d52a9c53f510237a194211aa3dc7d0f22f80fcc0593d9d77e0827ba6681b47e9

      SHA512

      429e97c74b8e45a43d09618972f04ba46a8075867a631543eb7b7cbbb55a719cbe2e0412f3b63b989741e3807d733b2a6f3ecb735278adc5e734e18e297c4015

    • memory/2952-24-0x000000001B280000-0x000000001B281000-memory.dmp

      Filesize

      4KB

    • memory/2952-25-0x000000001B290000-0x000000001B291000-memory.dmp

      Filesize

      4KB

    • memory/2952-10-0x000007FEF5F50000-0x000007FEF693C000-memory.dmp

      Filesize

      9.9MB

    • memory/2952-15-0x0000000001050000-0x0000000001051000-memory.dmp

      Filesize

      4KB

    • memory/2952-16-0x0000000001060000-0x0000000001061000-memory.dmp

      Filesize

      4KB

    • memory/2952-17-0x0000000001070000-0x0000000001071000-memory.dmp

      Filesize

      4KB

    • memory/2952-18-0x00000000028A0000-0x00000000028A1000-memory.dmp

      Filesize

      4KB

    • memory/2952-19-0x0000000002930000-0x0000000002931000-memory.dmp

      Filesize

      4KB

    • memory/2952-20-0x000000001B1C0000-0x000000001B1C1000-memory.dmp

      Filesize

      4KB

    • memory/2952-21-0x000000001B1D0000-0x000000001B1D1000-memory.dmp

      Filesize

      4KB

    • memory/2952-22-0x000000001B1E0000-0x000000001B1E1000-memory.dmp

      Filesize

      4KB

    • memory/2952-23-0x000000001B1F0000-0x000000001B1F1000-memory.dmp

      Filesize

      4KB

    • memory/2952-0-0x000007FEF5F53000-0x000007FEF5F54000-memory.dmp

      Filesize

      4KB

    • memory/2952-9-0x000000001E0B0000-0x000000001E1B2000-memory.dmp

      Filesize

      1.0MB

    • memory/2952-26-0x000000001B970000-0x000000001B971000-memory.dmp

      Filesize

      4KB

    • memory/2952-27-0x000000001B980000-0x000000001B981000-memory.dmp

      Filesize

      4KB

    • memory/2952-28-0x000007FE7BED0000-0x000007FE7BED1000-memory.dmp

      Filesize

      4KB

    • memory/2952-29-0x000007FE7BF00000-0x000007FE7BF01000-memory.dmp

      Filesize

      4KB

    • memory/2952-30-0x000007FE7BEE0000-0x000007FE7BEE1000-memory.dmp

      Filesize

      4KB

    • memory/2952-31-0x000007FE7BF10000-0x000007FE7BF11000-memory.dmp

      Filesize

      4KB

    • memory/2952-33-0x000007FEF5F50000-0x000007FEF693C000-memory.dmp

      Filesize

      9.9MB

    • memory/2952-8-0x000000001D850000-0x000000001E0A5000-memory.dmp

      Filesize

      8.3MB

    • memory/2952-7-0x000007FEF5F50000-0x000007FEF693C000-memory.dmp

      Filesize

      9.9MB

    • memory/2952-1-0x0000000001080000-0x000000000137C000-memory.dmp

      Filesize

      3.0MB

    • memory/2952-512-0x000007FEF5F53000-0x000007FEF5F54000-memory.dmp

      Filesize

      4KB

    • memory/2952-513-0x000007FEF5F50000-0x000007FEF693C000-memory.dmp

      Filesize

      9.9MB

    • memory/2952-514-0x000007FEF5F50000-0x000007FEF693C000-memory.dmp

      Filesize

      9.9MB

    • memory/2952-515-0x000007FEF5F50000-0x000007FEF693C000-memory.dmp

      Filesize

      9.9MB