Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 12:56

General

  • Target

    07ff5290bca33bcd25f479f468f9a0c0371b3aac25dc5bb846b55ba60ca658ed.exe

  • Size

    1.4MB

  • MD5

    429ebf3b919d8959e39f5c90b22e81dd

  • SHA1

    52ca91f7e8c0ffac9ceaefef894e19b09aed662e

  • SHA256

    07ff5290bca33bcd25f479f468f9a0c0371b3aac25dc5bb846b55ba60ca658ed

  • SHA512

    b462472208a2254e3724620a08438d9f251d70bb8edec6ff9906335eef12c16b29abc7d02535b373841aa141fae64e9aed0fe0750aff3570a6d77d087b73ad4f

  • SSDEEP

    24576:nQoFpItRUEuaEvDLGh4lz8NxHfh5Mxfc8CiF4H//0lF1b+/723dSCax/vY:9boOEdEv2hTHfh5Mxfc8Ocl3+723sH/w

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3056
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
      1⤵
        PID:1168
      • C:\Windows\system32\taskhostw.exe
        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
        1⤵
          PID:3092
        • C:\Windows\Explorer.EXE
          C:\Windows\Explorer.EXE
          1⤵
            PID:3428
            • C:\Users\Admin\AppData\Local\Temp\07ff5290bca33bcd25f479f468f9a0c0371b3aac25dc5bb846b55ba60ca658ed.exe
              "C:\Users\Admin\AppData\Local\Temp\07ff5290bca33bcd25f479f468f9a0c0371b3aac25dc5bb846b55ba60ca658ed.exe"
              2⤵
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1448
              • C:\Users\Admin\AppData\Local\Temp\07ff5290bca33bcd25f479f468f9a0c0371b3aac25dc5bb846b55ba60ca658ed.exe
                "C:\Users\Admin\AppData\Local\Temp\07ff5290bca33bcd25f479f468f9a0c0371b3aac25dc5bb846b55ba60ca658ed.exe"
                3⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3504
                • C:\Windows\SysWOW64\explorer.exe
                  "C:\Windows\SysWOw64\explorer.exe"
                  4⤵
                  • Modifies Internet Explorer settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1996
                • C:\Windows\SysWOW64\explorer.exe
                  "C:\Windows\SysWOw64\explorer.exe" socksParentProxy=localhost:9050
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4016
                  • C:\Windows\System32\Conhost.exe
                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    5⤵
                      PID:2188
                  • C:\Users\Admin\AppData\Roaming\Irapo\izle.exe
                    "C:\Users\Admin\AppData\Roaming\Irapo\izle.exe"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:4804
                    • C:\Users\Admin\AppData\Roaming\Irapo\izle.exe
                      "C:\Users\Admin\AppData\Roaming\Irapo\izle.exe"
                      5⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:3752
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp475e0e2d.bat"
                    4⤵
                      PID:2352
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                1⤵
                  PID:3536
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                  1⤵
                    PID:3740
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:3832
                    • C:\Windows\System32\RuntimeBroker.exe
                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                      1⤵
                        PID:3912
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:4008
                        • C:\Windows\System32\RuntimeBroker.exe
                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                          1⤵
                            PID:3488
                          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                            1⤵
                              PID:2520
                            • C:\Windows\System32\RuntimeBroker.exe
                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                              1⤵
                                PID:3280
                              • C:\Windows\system32\backgroundTaskHost.exe
                                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
                                1⤵
                                  PID:4872
                                • C:\Windows\System32\RuntimeBroker.exe
                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                  1⤵
                                    PID:1176
                                  • C:\Windows\System32\RuntimeBroker.exe
                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                    1⤵
                                      PID:2464

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\IdolConservancyCapstan

                                      Filesize

                                      545B

                                      MD5

                                      8a84c0e0a0d48a0761d5e3f1e568db44

                                      SHA1

                                      ebbfd2090b2af166c7c34d1c7e97f5594edc9e18

                                      SHA256

                                      47411046514b59e2cb4c111b733ca423adc4e8792c909c282acc6dab970804db

                                      SHA512

                                      3c371869b3a0a5358a0eee9cf3549fa077fbde30bfbe5bc59b4c0da4be2e5729df9d75b5ce732725f836ecfe9d87e3c5c71b974b882366f9257ce3cef30df78f

                                    • C:\Users\Admin\AppData\Local\Temp\nscBFF6.tmp\System.dll

                                      Filesize

                                      11KB

                                      MD5

                                      883eff06ac96966270731e4e22817e11

                                      SHA1

                                      523c87c98236cbc04430e87ec19b977595092ac8

                                      SHA256

                                      44e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82

                                      SHA512

                                      60333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390

                                    • C:\Users\Admin\AppData\Local\Temp\sirrah.dll

                                      Filesize

                                      52KB

                                      MD5

                                      e07ca0e84fc1eeedeccc2dec1e123128

                                      SHA1

                                      36731fd829ced121434e80ae92f62c169d949db3

                                      SHA256

                                      659d9bf3fbe53372fa97394cc67eb6904c9339a44d0c56a53d5ca1c4dda0c842

                                      SHA512

                                      bdf232c7b5784c38d7a0feeb103459cf6534eb6ce63e158efeb269452785219c3051f736ffa53ed20306f1cfa1ac3af6b4a09c8392f3126517d0c0f291772f10

                                    • C:\Users\Admin\AppData\Local\Temp\tmp475e0e2d.bat

                                      Filesize

                                      307B

                                      MD5

                                      dc83163d2106e76aa9b6a1a66c187afa

                                      SHA1

                                      3d6f926083cf6c4da5cbc60d3aedf0a1cbfe16c9

                                      SHA256

                                      57d7f19d098762086b560cb306efc309d0ebaf5eb607586c27807e7a7202b882

                                      SHA512

                                      b586b709542f77ad3b5029ff61e243768cfd69f8cb841ec2063b8f5dd75f37d3df11f096a9500cd765a247133e8972dea997012a5fe933c96b273b6f6cc3177e

                                    • C:\Users\Admin\AppData\Roaming\Irapo\izle.exe

                                      Filesize

                                      1.4MB

                                      MD5

                                      47836dfdf31611f88924e707095d61d4

                                      SHA1

                                      308eeebd38e7747499fda4868b76f2e488dd8b50

                                      SHA256

                                      05ba0740c35b7daa65867db9586f3ae41d6abbdbf3328766760b4b8f6d162765

                                      SHA512

                                      535f654c9c2be458370f53ee93095a4729a591af7a17a9c849426d1356c1a0318e7f13fde7448f98267a04c8f4567d8d21e758a932e445cf7b15a7b61401f97b

                                    • memory/1448-11-0x0000000003050000-0x000000000305E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/1996-71-0x0000000000E00000-0x0000000000F85000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/1996-70-0x0000000000E00000-0x0000000000F85000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/1996-66-0x0000000000E00000-0x0000000000F85000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3504-65-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3504-26-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3504-24-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3504-21-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3504-22-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3504-20-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3504-19-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3504-53-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3504-14-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3752-62-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3752-77-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3752-89-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3752-83-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3752-79-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3752-81-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3752-82-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3752-80-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/3752-78-0x0000000000400000-0x0000000000585000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/4016-75-0x0000000001D50000-0x0000000001ED5000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/4016-74-0x0000000001D50000-0x0000000001ED5000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/4016-73-0x0000000001D50000-0x0000000001ED5000-memory.dmp

                                      Filesize

                                      1.5MB

                                    • memory/4016-25-0x0000000000400000-0x000000000043A000-memory.dmp

                                      Filesize

                                      232KB

                                    • memory/4016-84-0x0000000000400000-0x000000000043A000-memory.dmp

                                      Filesize

                                      232KB

                                    • memory/4016-28-0x0000000000400000-0x000000000043A000-memory.dmp

                                      Filesize

                                      232KB

                                    • memory/4016-29-0x0000000000400000-0x000000000043A000-memory.dmp

                                      Filesize

                                      232KB

                                    • memory/4804-49-0x00000000022B0000-0x00000000022BE000-memory.dmp

                                      Filesize

                                      56KB