Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/07/2024, 17:18

240703-vvk8hazcqq 10

03/07/2024, 16:20

240703-ts74tatfpm 8

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 16:20

General

  • Target

    Mia_Khalifia(18+).exe

  • Size

    4.2MB

  • MD5

    9c6352ad45c6ce5ab18f75f4fcf3c85d

  • SHA1

    3908a22b5a4dceedc813b0deded861fdbc9ae6fb

  • SHA256

    c00280f16aa9c12f6a8a7f29c493f17c237e570ae1fe481d368ea0ab4eafedf5

  • SHA512

    ba2d87ea0c656b6b3de4075e465b8b5c991c89a32446c460ede9052e7b9ea7b64e52858971a5b620ad78393074b84cc7bcde70cf989e1de76514f3076e07f925

  • SSDEEP

    98304:mnyNQa/26tLM4OXoQCn9+juAoHsvP0mDFn169ryxbTkNW:0yNQa+OLM4eoQIiIsXnu9exHko

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mia_Khalifia(18+).exe
    "C:\Users\Admin\AppData\Local\Temp\Mia_Khalifia(18+).exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\is-OP72B.tmp\Mia_Khalifia(18+).tmp
      "C:\Users\Admin\AppData\Local\Temp\is-OP72B.tmp\Mia_Khalifia(18+).tmp" /SL5="$3012A,4088111,75776,C:\Users\Admin\AppData\Local\Temp\Mia_Khalifia(18+).exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" cmd /c 4554.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Windows\SysWOW64\attrib.exe
          attrib +s +h /D "C:\Users\Admin\AppData\Local\Temp\av\*.*"
          4⤵
          • Sets file to hidden
          • Views/modifies file attributes
          PID:2756
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c tar xf 85.zip
          4⤵
            PID:2732
          • C:\Windows\SysWOW64\attrib.exe
            attrib +s +h /D "C:\Users\Admin\AppData\Local\Temp\av\*.*"
            4⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab453C.tmp

      Filesize

      67KB

      MD5

      2d3dcf90f6c99f47e7593ea250c9e749

      SHA1

      51be82be4a272669983313565b4940d4b1385237

      SHA256

      8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

      SHA512

      9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

    • C:\Users\Admin\AppData\Local\Temp\Tar467B.tmp

      Filesize

      160KB

      MD5

      7186ad693b8ad9444401bd9bcd2217c2

      SHA1

      5c28ca10a650f6026b0df4737078fa4197f3bac1

      SHA256

      9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

      SHA512

      135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

    • C:\Users\Admin\AppData\Local\Temp\av\4554.cmd

      Filesize

      210B

      MD5

      f8254e719c5f499fcd279d9a7f3eae3d

      SHA1

      ba6158e60b2da3d9eab7e2c3a76630194d099e25

      SHA256

      b302609a09311ad913431e2be94447c9fe248ff573510d6d3b7d80a0cd49d031

      SHA512

      d02be62040c62b0916b750c2ed776a273b57a9754eab8a2858a713dafd915ccb3257cb6944565490dfcea6608e38b31a7189b8c19bfd01b7d2e487b5bfeb547b

    • \Users\Admin\AppData\Local\Temp\is-4FV5A.tmp\_isetup\_shfoldr.dll

      Filesize

      22KB

      MD5

      92dc6ef532fbb4a5c3201469a5b5eb63

      SHA1

      3e89ff837147c16b4e41c30d6c796374e0b8e62c

      SHA256

      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

      SHA512

      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

    • \Users\Admin\AppData\Local\Temp\is-4FV5A.tmp\idp.dll

      Filesize

      216KB

      MD5

      b37377d34c8262a90ff95a9a92b65ed8

      SHA1

      faeef415bd0bc2a08cf9fe1e987007bf28e7218d

      SHA256

      e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

      SHA512

      69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

    • \Users\Admin\AppData\Local\Temp\is-OP72B.tmp\Mia_Khalifia(18+).tmp

      Filesize

      915KB

      MD5

      9659ca7527a63b56d0bc5750be04a2d5

      SHA1

      e09fde1f286802c9374ea9a5a813e321c28d1de2

      SHA256

      7b8b708f6062f4a3a1d7dca4e71d04035e5f3df0aae41f1f9d83692787a78706

      SHA512

      80a4b22d49384b61fa50814ea5d475879bacf47a52c6e211935b127e234cefca20fa6fe67b582d2ea503db85246a1650384fa0dbd7d7c0d6abb20ea5d0f028dd

    • memory/948-0-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/948-62-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/948-3-0x0000000000401000-0x000000000040B000-memory.dmp

      Filesize

      40KB

    • memory/948-91-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/1768-15-0x0000000000400000-0x00000000004F7000-memory.dmp

      Filesize

      988KB

    • memory/1768-63-0x0000000000400000-0x00000000004F7000-memory.dmp

      Filesize

      988KB

    • memory/1768-68-0x0000000000400000-0x00000000004F7000-memory.dmp

      Filesize

      988KB

    • memory/1768-89-0x0000000000400000-0x00000000004F7000-memory.dmp

      Filesize

      988KB