Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/07/2024, 04:39

General

  • Target

    e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe

  • Size

    300KB

  • MD5

    7149335ef0bbf3bb00ed73e81733c900

  • SHA1

    fc2901e58bbd79c16adfeb94f9c0342dd0a0381f

  • SHA256

    e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4

  • SHA512

    9d7d84d4ad0d6fe20dbe632f98a7692b69544668fadb3f90d08a90b8c0bc22c06b808f201fb543429eee0ce5003b05478beabccbb2769efda8c00796a2971eef

  • SSDEEP

    6144:caQbbFhjLoqmVQP8C/ldsGKQVj5r3AFIF2jq3VfRD9oOkO/uvvX211:cTxcwZRKO3A5uRfWvvY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe
    "C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe
      "C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2008
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2480
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\e117aee9a31901b0865be8c2e3f36c7009b7d325cdbff77829ea81cc6654daf4.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2744
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2460
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:799750 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\acrotray .exe

    Filesize

    326KB

    MD5

    e802302553f683af5e06832636c0758b

    SHA1

    c151e431a66c9b1f4ced067bb49337c365f21af0

    SHA256

    ba19bfd435008b9f3f1284fa7707e8579a3bfe829e840d3de08f7a6791414c9a

    SHA512

    a9c5195c4f6838f88993e0e5bda9101e8c9873291e20b278e4406e36a086d84a5611081f80f1b8b0841d728b6334d82b51593a17c625903adca7ef084279e9bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    db6964510b5fb473ecd3ffeb581bc968

    SHA1

    4c0e486c33db353482689a1a595d9fc0a8052546

    SHA256

    31dd6017e9bad58133194f765e46871c9b44315b13ebd7a2798b8216ccf97578

    SHA512

    fdbf5cfda11d831690b947d532054ca9f3b53397951b5bbfac7a022d7203c14ad27fb3317eb139492473c57cdc4fe1a5be185a686c739c03f5c9af2f0560c3ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    585775198a795915a7df968cda156b84

    SHA1

    7187c997ecbb37eca1f272bc6aed671bc70a68f6

    SHA256

    b4053019d1f1d4682e140489ffebb5cbd93d8bdd1348a808b73e64c56794e442

    SHA512

    70a20e5bd7dc0f4d6ee8f8fa5df3af47eabb9d8f1e282e8a1da406ea22c1999bfaa9af8c87ae7f070832f4911afab8fbb2870a2464c47811a1f8afa9f69b50f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9da6e1079e1c0a7a32e05dceddc36cc8

    SHA1

    8f2d6e44e3326cbe222c077838632bc0c11a6804

    SHA256

    a9bf7af8440f07dd2cca8a4be24ac3c80e871aabf96ce46c19879b4e32189621

    SHA512

    575f39f6ca25bbdba9a569a719f9a19e6b19061c6d2e5ee0a0b352dd5638f824cdf63c941c985eabb253499ede02bc64b6a43f2917469df33c502a104d97f528

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4783b012d23cc6e59cfaaee2e1494ec4

    SHA1

    99eb5d616b228480311dbf21eaccae67b42a3b39

    SHA256

    28b6c3e1588a5db3761b210b925a1466bba805464c9bc571daa91cc6e8a37fd2

    SHA512

    e1ab4a99d7d050422943e1dbffcee3515c5ba5d5d80b2435fa95b1fccedc3189f3db54a5019de8967926341134f1beecc20e3bd4087e66ec2dd8f834fe25ef68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2293d38d1e25ff4265d8de1fdd77c680

    SHA1

    70352f643d8d54941b18109642d30e66507af19a

    SHA256

    caf9a007a012ff5970f64e74e34a7bde652d6f3920c3ffe5025021b3aa8dfaa2

    SHA512

    315aae84000c22a12839809a657e74e88f9ca18be5da6e99017d9d1b23a1264f9a6cac2ebc4c6938c1019084a272307bdc1945bf004e0944b59b73b543bf0081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a652e435876c514ca34c9040c41887fd

    SHA1

    6aed27eba4970e4f17e1d0ed4af9ac1f56866b86

    SHA256

    4428f8a866a80d1e283b69a75456d8eb1f065ab9f2bcadf55afc18a4c84c7971

    SHA512

    54411dd9b517317d0e6b7f6050eec59dbcdf8aea708b2d551367e97205a65622941a11c97c002e9b3783428260272ebe9dca0e2804a0c18ba1508df7d347b67b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    4501c4f6404b6f0c18340c181d5214eb

    SHA1

    712260f8755469497064b7e87fc75bc6b0ddc4d0

    SHA256

    2a070e345a144482e0a1d16a1bb38a030e159d6d1f9e2acd99b5bbe87cbed439

    SHA512

    2462f63485bc37058bfbb37435cdeace9fdcec65c894096ab63c097cf989f8b3fda507bee88ee0ebc579c4bd80163df9d227d1f5719ebce881ceec9dac97f9e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    7aaf28fe7c6efeb9fea04b6786b78c71

    SHA1

    f7adc6e1f048f7baac735910706bfc1552e99648

    SHA256

    11800c1b45716fcdc2bcd353cb0b3d6c2a861a042a2c299dc8f5741bce87c505

    SHA512

    99d23e7685aab8c8e184e1596cfce571e8e777465d4b10cd11558db1335fee254a7e7a314303e6c21da093eb63331570225d01c70062271701d4ba61f10350d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    6611c0f0b71256469d2a81868b113309

    SHA1

    c1b032b60bbf036446b6ea5094059392bb3e5119

    SHA256

    da8e08be87222e65ec0a925a1be42954398a42001b422994448d9783a150eb41

    SHA512

    4df73e6aea36a729967e113483a19db7cb63dddc2e46525757501c7c87baa773f6f32077dcc81beb0587d1d78d1d9d52cc66f9ee70ef1940998eb451dbcb7240

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    5a5002b2b10a8457e6ea85528015b0b5

    SHA1

    bf9384c18725b62cfcde5ce593713991ad2eaa8d

    SHA256

    dcada04dabfb09948a8a46a5cb5d1d58b21556900968cc624c3e21694d4e3780

    SHA512

    ed7dedb5393d471a420f9ed6dc234ad062d9cfa841fe6b66973694f185c4072ead781caffe277d1b6e5ac08c699b55d6cb07f490bdf9ebeaa132d7fa3ba6bcb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    3de09ace05f21063bfee9db3770aea74

    SHA1

    9532ab1adc76d53541b8f368c724a48a09937da8

    SHA256

    1bbf0d6dd8a5be7e78a5b4cb832bc965ebc1ce454faeab53a2ce3bc841d62437

    SHA512

    3c95d11f858711180fc42f8cb15bca3b9c52c4c27169e3d3662350dc2f202480b7fc176c15728318f60578d04102821baa10b4877b5511a606f3acc716298fc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    094100b96aa29536991d9201343c1e3b

    SHA1

    33a324b8f908f04cb1dbce7f790d9212ed136496

    SHA256

    9f2e0ff4514486ee5cd53db66c51a76aa7813d3e3d44a49706dac406c0d1e814

    SHA512

    e79cf6ab47a34a414aca5e9d185c5224143618b65ef3f2963a66c05c18c0ed4c276e42eb81b6d91d7ec1f3968f6560eecd2cd011085b746d375eb1f132c4d46d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0d1943f33f4954867ac8fa0fda409b85

    SHA1

    daabdd28eb35369609d59c961310757a538deb5c

    SHA256

    3b8173cb8045263a841f05daa293a684ae852bf30734b7f414ea0be296ff3f47

    SHA512

    78d5f310a41450a59693a68763263fc77170934a65dd54cadf6225f0c4bee81dc87e70a71bbcde946a7ac95b938b663d0fc69664d52e3eb7b09e149a6b212288

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c8031fb6b7b899b8ee16141dde7c4349

    SHA1

    29418fadbba366f39a29aabd060c93a63e2f410b

    SHA256

    56fdee3d4976f6c09202a5f228d3be69e7459349e15d29b436ed78a12f49a649

    SHA512

    fd2045b52e71b9252c7e183cb8fa2dd81839ca4b0597a4c658105949f6d323f4862356e88ba2d4704c62034a961ea7ef4ded899c1208817487ea278795d5511d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    34d163ea19436256bd3228dc5b009755

    SHA1

    783d812d59e65e1981f6c9dca08fdc49929b7133

    SHA256

    b0c4f5a5a5cd9677a3f2db2806837fed896584c15df14fa3ae7533fab45a93a4

    SHA512

    a5086095ff71121624156f66afbe0a94139ab93a6f3ba56f9a854cbe4eac43ff6d6306016dbada2356a67b57b4b1dfb51534cc85a1d9aaf46fd2143fd0b7c0e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ea157fed89af5d10ec7f769f4e9444e2

    SHA1

    e372e24db6ebcce1cb18a67e421a8d0a25176241

    SHA256

    c9a629555f45a98dc349866a13f45a4f27f79756430aadfefc2e1bd6361dc609

    SHA512

    1779121e66361d535d0d02aaaa56bccc0932253fab043683ae89b145e2bfff7c87217bf77a982d052eaf28be6850a6de8d264dd437d1703a019424f5b2cbc46b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    8712db84407ae21fd075ed61065456ef

    SHA1

    3973799a8c6af5969bf95abbd11fbc2069a14fdf

    SHA256

    2daebf0c4c9ba9b1d5a445a85d014c7eeaf37e42cb195e61789a8110e29634e6

    SHA512

    796aa3877dcd35e639e3f2d66a3639480b1d796631c922ecd7c563fed1f4f82efbf5de8cf3608fffdbc35eb67c401d132cc45c55333c7e11edbe8208cb177bc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    12c04debae3dee99e69dcb961bbaef9c

    SHA1

    4990aa201209f45179f670f590b7bb8bea8c035d

    SHA256

    4d8f0f06a3dcbffc7170fe38640cb87016a0caf6c0c1d41ad7fefb5ed784fb77

    SHA512

    06a91f8c90c38fc5ba4bb0b4e2cac2d1a14b0496715ce21675861a6d6e53bb78121b5c93f785190932e9beab678e49f990e91d2dbf9115f6542fa2d75654413b

  • C:\Users\Admin\AppData\Local\Temp\Cab8384.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8485.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VFQROL0ZD4P4ST7DWO8F.temp

    Filesize

    3KB

    MD5

    00ef3d873bcb88b0b7dbe39b2b1917dd

    SHA1

    e49645436ac908465015df4c518530381c9e981c

    SHA256

    44a77a1486f88fed0945dd45d886e4111b6bc1c10684ea79d710e640f47b8f2c

    SHA512

    73b9508224976099e83ee9106c0869f4529a56904089c1977ff1fcf8f2799afc90c1c6add243e8435b5f13f54c38be9fabcf4a366692eb524f6493f0b6d8dc8a

  • \Program Files (x86)\Adobe\acrotray.exe

    Filesize

    312KB

    MD5

    22c8cff9d69bb88e16d4fbe72a0b11aa

    SHA1

    804725b78fd260c4c2b90035d1b493dd3374f8bb

    SHA256

    bdb1245b8f9596d3b52633858845df615b366d3ce71642bd048c0ccc1f893803

    SHA512

    ac0c7235bc9b10fb9a9752998367ec74c2f11d1ecb88c0b12901b95cf580ef578bdbf7d5793b473baf034072f89c823308408f3d7259a9d6aca1571415aa62bb

  • memory/880-1-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/880-35-0x0000000003150000-0x0000000003152000-memory.dmp

    Filesize

    8KB