Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 20:24

General

  • Target

    Boleto-10-2011.exe

  • Size

    353KB

  • MD5

    681abf81004f57b2930a7fade361c160

  • SHA1

    43707fceb0fda0045e2ad1522375f66a25a9a5ad

  • SHA256

    7e07c36e47c45f16faf8f41e4805396dc99445a3c563258d9a6ed65b638e073a

  • SHA512

    15ad726644ffb33279afe2beef362de6f077247e6487b589bcffebb45ab00608286448d0d02c16ef4c3c486dee374e9fc95988641f3c4702be7e442494178585

  • SSDEEP

    6144:uAkg2vhVMaJTXPiap/ZMUxgdUCxlZn+aC1meyUGimMxSkOZbX:u02ZVvx6aTMLX/5W1meyUGp8POt

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Boleto-10-2011.exe
    "C:\Users\Admin\AppData\Local\Temp\Boleto-10-2011.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\Nreg.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RDSound /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Huawei3g.exe" /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2664
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\NUac.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2644
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\System32\cmd.exe /k C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • Modifies registry key
          PID:1692
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\NUac.bat

    Filesize

    164B

    MD5

    c80c14c9b9ffd63a2ed8037940d75103

    SHA1

    3f24e10b213bd483067709c8c4f7b75c29464eff

    SHA256

    236f2acb03d56106f0e6b693108f25ed2eb9b7d0503a84e6948e797f8c15dd6b

    SHA512

    f51619a769fc86bc091bd1a534c6cac5d8c426ddd9784fd98bb23b7f0c699fcc473722dffa1196391c3e92f4647ce96de4b3326c25f49014552b0346a6f4e2c9

  • C:\Users\Admin\AppData\Roaming\Nreg.bat

    Filesize

    118B

    MD5

    c515911f3c9c95c71397ec270d03dc09

    SHA1

    5ed1e95629a721abeb30666d699798fe8d3399a3

    SHA256

    07589b5e7fa05ac15a19128dab9bbedcd485492f7e41b3bbcc97a6430610265c

    SHA512

    055617212f73e2b32ba13ea6d5c114c38c9a9d633d797f16fa7aacf121b68b44e93700a632f21f37ad805df4157b93aab9dc4dbe9662863444aece3449c0d367

  • C:\Users\Admin\AppData\Roaming\sunjunSan.dll

    Filesize

    129KB

    MD5

    073bea567f124dc7454897430b79a865

    SHA1

    88b02e94559e907c824ef8c208095652220aef01

    SHA256

    871edddb9774bb7a7f247418e75f3692f9297207df6d94bc749a0b2b745f2402

    SHA512

    5f038bae6bcb5c8e504d1d26ada43920ca83d0a9fd1fa1d1c428fceb09783946c48f07d0b11c00cfc9d2764e26a0cc9b91738a1f3de586a861a403ce171acd1a

  • memory/2696-6-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2696-13-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2696-9-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2696-8-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2696-7-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2696-0-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-5-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/2696-4-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2696-3-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/2696-2-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/2696-1-0x00000000003C0000-0x00000000003C2000-memory.dmp

    Filesize

    8KB

  • memory/2696-11-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2696-21-0x0000000003940000-0x0000000003950000-memory.dmp

    Filesize

    64KB

  • memory/2696-12-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2696-10-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2696-34-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-72-0x0000000003940000-0x0000000003950000-memory.dmp

    Filesize

    64KB

  • memory/2696-62-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-55-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-73-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-74-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-75-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-76-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-77-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-78-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-79-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-80-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-81-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-82-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-83-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB

  • memory/2696-84-0x0000000000400000-0x00000000004DC000-memory.dmp

    Filesize

    880KB