Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

12/07/2024, 23:52

240712-3wvgkaydqa 7

12/07/2024, 23:49

240712-3vepqawekn 8

Analysis

  • max time kernel
    432s
  • max time network
    441s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12/07/2024, 23:52

General

  • Target

    GjIeRXj.exe

  • Size

    9KB

  • MD5

    672bb10a8b900749928a5dba1f30f505

  • SHA1

    cf21194bf2ad984689eb4120f8a24e6821f7f4fa

  • SHA256

    cc64a875031c75c7f20410d362651e4c886c2e12b13fd041dcf492471f8694ec

  • SHA512

    19822e0154074d2264520edc472a32950648dafb4f269988bcd0e6dd1d22d302b9be744278277f5028bf3481037fa3a661594578a8a6c71317dc810cd3bb8bee

  • SSDEEP

    192:P/J7CcaAtRdBzGkDbb5qZKFGbj+pFaNJhLkwcud2DH9VwGfctsuQP:B1FNkKymaNJawcudoD7UmHP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GjIeRXj.exe
    "C:\Users\Admin\AppData\Local\Temp\GjIeRXj.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\AppData\Local\Temp\8EB3.tmp\b2e.exe
      "C:\Users\Admin\AppData\Local\Temp\8EB3.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\8EB3.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\GjIeRXj.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8FEC.tmp\batchfile.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\SysWOW64\findstr.exe
          findstr /v "^;;;===,,," "C:\Users\Admin\AppData\Local\Temp\8FEC.tmp\batchfile.bat"
          4⤵
            PID:4432
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            PowerShell.exe -ExecutionPolicy Bypass -Command "& 'C:\Users\Admin\AppData\Local\Temp\8FEC.tmp\ps.ps1'"
            4⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8EB3.tmp\b2e.exe

      Filesize

      13KB

      MD5

      b98952914563ae10d390dcf06eb435e4

      SHA1

      f96fc1370bacb1d32b9b9c3c786a024c0ec4414d

      SHA256

      1b4cd7f1798849c2d6f8b6527ed439f08d7d4834b54d48496403d8d3f1ae0fd1

      SHA512

      3f4c871dc7aae92ec21523e4a825a4c4dfd3d99b99246c8c3c9f7e1243efa9cb29e75b3b31dfa3f1ce63175c6c27c1ea6cbfcf9596fb73dd63b4076ea6e68029

    • C:\Users\Admin\AppData\Local\Temp\8FEC.tmp\batchfile.bat

      Filesize

      4KB

      MD5

      3b0ade72d04f213270c57a5393588687

      SHA1

      cf58e2d8bcbe5638c7d396ee82a2bb992b67516e

      SHA256

      2744a7dc3b526f20b1553506e6d3076dfad30ab56309c7896d393686e38f1523

      SHA512

      9b3bae372e77bc2236f750ea7f32ff9d2a6d047cb96c6af9a4a4b2b489d4700795350b52a337d14845d5aca25354dd997fe0d1176d3cc4006ae3de42ae635ffd

    • C:\Users\Admin\AppData\Local\Temp\8FEC.tmp\ps.ps1

      Filesize

      4KB

      MD5

      160c222cb06b996df28d277be301ed34

      SHA1

      6c7d58222cc005beca82597d9822a78bf6662d1e

      SHA256

      5c68b2bdad8c2bb73e157ac247565f4baf5540f48e6b01371863d567275f1398

      SHA512

      cd33be6ccc8933aa1f7b6c0bf4888c00990d894a392a15c979a8eedf9d67aa522d3cf78c4e110c41abc177fa5d0df79982bdebaeb7be5986ccac32a166340666

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l5mlo2bv.jkh.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/740-37-0x00000000079A0000-0x0000000007A3C000-memory.dmp

      Filesize

      624KB

    • memory/740-49-0x00000000075D0000-0x00000000075EE000-memory.dmp

      Filesize

      120KB

    • memory/740-18-0x0000000002D40000-0x0000000002D76000-memory.dmp

      Filesize

      216KB

    • memory/740-19-0x00000000058B0000-0x0000000005EDA000-memory.dmp

      Filesize

      6.2MB

    • memory/740-20-0x00000000057E0000-0x0000000005802000-memory.dmp

      Filesize

      136KB

    • memory/740-21-0x0000000005FD0000-0x0000000006036000-memory.dmp

      Filesize

      408KB

    • memory/740-22-0x0000000006040000-0x00000000060A6000-memory.dmp

      Filesize

      408KB

    • memory/740-71-0x00000000087A0000-0x00000000087A8000-memory.dmp

      Filesize

      32KB

    • memory/740-31-0x00000000060B0000-0x0000000006407000-memory.dmp

      Filesize

      3.3MB

    • memory/740-32-0x0000000006540000-0x000000000655E000-memory.dmp

      Filesize

      120KB

    • memory/740-33-0x0000000006590000-0x00000000065DC000-memory.dmp

      Filesize

      304KB

    • memory/740-70-0x0000000008760000-0x000000000877A000-memory.dmp

      Filesize

      104KB

    • memory/740-35-0x0000000007CD0000-0x000000000834A000-memory.dmp

      Filesize

      6.5MB

    • memory/740-36-0x0000000006AA0000-0x0000000006ABA000-memory.dmp

      Filesize

      104KB

    • memory/740-69-0x0000000008720000-0x0000000008735000-memory.dmp

      Filesize

      84KB

    • memory/740-39-0x000000006FF50000-0x000000006FF9C000-memory.dmp

      Filesize

      304KB

    • memory/740-38-0x00000000075F0000-0x0000000007624000-memory.dmp

      Filesize

      208KB

    • memory/740-17-0x00000000735AE000-0x00000000735AF000-memory.dmp

      Filesize

      4KB

    • memory/740-40-0x00000000700B0000-0x0000000070407000-memory.dmp

      Filesize

      3.3MB

    • memory/740-50-0x0000000007A50000-0x0000000007AF4000-memory.dmp

      Filesize

      656KB

    • memory/740-51-0x0000000007BB0000-0x0000000007BCC000-memory.dmp

      Filesize

      112KB

    • memory/740-52-0x00000000075E0000-0x00000000075EA000-memory.dmp

      Filesize

      40KB

    • memory/740-53-0x0000000007C20000-0x0000000007C46000-memory.dmp

      Filesize

      152KB

    • memory/740-54-0x00000000089D0000-0x0000000008F76000-memory.dmp

      Filesize

      5.6MB

    • memory/740-55-0x0000000008500000-0x0000000008592000-memory.dmp

      Filesize

      584KB

    • memory/740-56-0x00000000700B0000-0x0000000070407000-memory.dmp

      Filesize

      3.3MB

    • memory/740-65-0x00000000084F0000-0x00000000084FA000-memory.dmp

      Filesize

      40KB

    • memory/740-66-0x00000000087C0000-0x0000000008856000-memory.dmp

      Filesize

      600KB

    • memory/740-67-0x00000000086C0000-0x00000000086D1000-memory.dmp

      Filesize

      68KB

    • memory/740-68-0x00000000086F0000-0x00000000086FE000-memory.dmp

      Filesize

      56KB

    • memory/2960-9-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2960-74-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/4900-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/4900-11-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB