Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    63s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 20:25

General

  • Target

    xx.exe

  • Size

    36.4MB

  • MD5

    5c61e8ecf49b4ee4210a916e92f93185

  • SHA1

    120820e2b513aeb5f59e54ef62763efc05a7ab34

  • SHA256

    f4450122b7720886d3a589b6c41715656957d3138ad903be6b315ec4a0c4b5b1

  • SHA512

    19d4841ea0b8cc1e2103ce1b2f8b1160bc6e6ad5cdd82f5e00fe82d8f89a599ea12e4503610d7249cc150183f56358a6dec11a707429058014c0bad14880414a

  • SSDEEP

    393216:f1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfd:fMguj8Q4VfvaqFTrYfx

Score
1/10

Malware Config

Signatures

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\xx.exe
    "C:\Users\Admin\AppData\Local\Temp\xx.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Windows\system32\cmd.exe
      cmd.exe /C call powershell -E QQBkAGQALQBUAHkAcABlACAAQAAiAAoAIAAgACAAIAB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQA7AAoAIAAgACAAIAB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAFIAdQBuAHQAaQBtAGUALgBJAG4AdABlAHIAbwBwAFMAZQByAHYAaQBjAGUAcwA7AAoAIAAgACAAIABwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAEMAbwBuAHMAbwBsAGUAVwBpAG4AZABvAHcAVQB0AGkAbABzACAAewAKACAAIAAgACAAIAAgACAAIABbAEQAbABsAEkAbQBwAG8AcgB0ACgAIgBrAGUAcgBuAGUAbAAzADIALgBkAGwAbAAiACkAXQAKACAAIAAgACAAIAAgACAAIABwAHUAYgBsAGkAYwAgAHMAdABhAHQAaQBjACAAZQB4AHQAZQByAG4AIABJAG4AdABQAHQAcgAgAEcAZQB0AEMAbwBuAHMAbwBsAGUAVwBpAG4AZABvAHcAKAApADsACgAgACAAIAAgACAAIAAgACAACgAgACAAIAAgACAAIAAgACAAWwBEAGwAbABJAG0AcABvAHIAdAAoACIAdQBzAGUAcgAzADIALgBkAGwAbAAiACkAXQAKACAAIAAgACAAIAAgACAAIABwAHUAYgBsAGkAYwAgAHMAdABhAHQAaQBjACAAZQB4AHQAZQByAG4AIABJAG4AdABQAHQAcgAgAEcAZQB0AFAAYQByAGUAbgB0ACgASQBuAHQAUAB0AHIAIABoAFcAbgBkACkAOwAKAAoAIAAgACAAIAAgACAAIAAgAFsARABsAGwASQBtAHAAbwByAHQAKAAiAHUAcwBlAHIAMwAyAC4AZABsAGwAIgApAF0ACgAgACAAIAAgACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAGUAeAB0AGUAcgBuACAAYgBvAG8AbAAgAFMAaABvAHcAVwBpAG4AZABvAHcAKABJAG4AdABQAHQAcgAgAGgAVwBuAGQALAAgAGkAbgB0ACAAbgBDAG0AZABTAGgAbwB3ACkAOwAKACAAIAAgACAAIAAgACAAIAAKACAAIAAgACAAIAAgACAAIABwAHUAYgBsAGkAYwAgAHMAdABhAHQAaQBjACAASQBuAHQAUAB0AHIAIABHAGUAdABUAGEAcgBnAGUAdABXAGkAbgBkAG8AdwAoACkAIAB7AAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAASQBuAHQAUAB0AHIAIABjAG8AbgBzAG8AbABlAFcAaQBuAGQAbwB3ACAAPQAgAEcAZQB0AEMAbwBuAHMAbwBsAGUAVwBpAG4AZABvAHcAKAApADsACgAgACAAIAAgACAAIAAgACAAIAAgACAAIABJAG4AdABQAHQAcgAgAHAAYQByAGUAbgB0AFcAaQBuAGQAbwB3ACAAPQAgAEcAZQB0AFAAYQByAGUAbgB0ACgAYwBvAG4AcwBvAGwAZQBXAGkAbgBkAG8AdwApADsACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGkAZgAgACgAcABhAHIAZQBuAHQAVwBpAG4AZABvAHcAIAA9AD0AIABJAG4AdABQAHQAcgAuAFoAZQByAG8AKQAgAHsACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHIAZQB0AHUAcgBuACAAYwBvAG4AcwBvAGwAZQBXAGkAbgBkAG8AdwA7AAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHIAZQB0AHUAcgBuACAAcABhAHIAZQBuAHQAVwBpAG4AZABvAHcAOwAKACAAIAAgACAAIAAgACAAIAB9AAoAIAAgACAAIAB9AAoAIgBAAAoACgBbAEMAbwBuAHMAbwBsAGUAVwBpAG4AZABvAHcAVQB0AGkAbABzAF0AOgA6AFMAaABvAHcAVwBpAG4AZABvAHcAKABbAEMAbwBuAHMAbwBsAGUAVwBpAG4AZABvAHcAVQB0AGkAbABzAF0AOgA6AEcAZQB0AFQAYQByAGcAZQB0AFcAaQBuAGQAbwB3ACgAKQAsACAAMAApACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA=
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -E 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
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rkjeiefs\rkjeiefs.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES88F6.tmp" "c:\Users\Admin\AppData\Local\Temp\rkjeiefs\CSC7D0C891D926D445C89134E763C3A145E.TMP"
            5⤵
              PID:2292
      • C:\Windows\system32\cmd.exe
        cmd.exe /C call C:\Users\Admin\AppData\Local\Temp\4993a45d7d21873f158299b5c8d0f719.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3432
        • C:\Windows\system32\findstr.exe
          findstr /i "echo" "C:\Users\Admin\AppData\Local\Temp\4993a45d7d21873f158299b5c8d0f719.bat"
          3⤵
            PID:432
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell "$d = wmic diskdrive get model;if ($d -like '*DADY HARDDISK*' -or $d -like '*QEMU HARDDISK*') { taskkill /f /im cmd.exe }"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2272
            • C:\Windows\System32\Wbem\WMIC.exe
              "C:\Windows\System32\Wbem\WMIC.exe" diskdrive get model
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3264
            • C:\Windows\system32\taskkill.exe
              "C:\Windows\system32\taskkill.exe" /f /im cmd.exe
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1384

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        2f57fde6b33e89a63cf0dfdd6e60a351

        SHA1

        445bf1b07223a04f8a159581a3d37d630273010f

        SHA256

        3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

        SHA512

        42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        64B

        MD5

        50a8221b93fbd2628ac460dd408a9fc1

        SHA1

        7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

        SHA256

        46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

        SHA512

        27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

      • C:\Users\Admin\AppData\Local\Temp\4993a45d7d21873f158299b5c8d0f719.bat

        Filesize

        3.8MB

        MD5

        4140c78d3b396d5bf41888f950b84705

        SHA1

        eb1d423c0b1f433750b045f4e700e670a43a9eec

        SHA256

        f83e7e1be8459dc8660717f4d1279fc832884c5db128679b9172bac005970611

        SHA512

        7251b3700c3a292c8e644ffe65d6925bb9ab562791ae134b449653daa998fc7d866d71d9a2af7e4c9c477801c807e9139c0aa8215d1ef8621c4823259751cf0a

      • C:\Users\Admin\AppData\Local\Temp\RES88F6.tmp

        Filesize

        1KB

        MD5

        b2dc9fecc2439bea2e57ee747414028e

        SHA1

        ec27b9cfd57a5f1241657968fad0b3bbcb476e60

        SHA256

        595d496c308f58563f04fc25a1c9b09e6019847dddaa9a7bef860027a0cc2e0a

        SHA512

        e055ec9dd3905405c69b9ee1da2aa62116d32fb38cf191057c2aebd245337ca6721b5acf921a6f0ab360aeb0718e6d8e5fbfab7899191999cbe806f9a6cdae4e

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nacy3jh1.uhi.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\kdotPDFQX.bat

        Filesize

        199B

        MD5

        533d12ccbf1ad0e4cb4649390ee9f09b

        SHA1

        81c2171b715d2033dc998e298f847fae4003f64f

        SHA256

        b79cb79838399f03f21ba5380650552abcafde22c1d449bc3664300b399e88da

        SHA512

        90edc1601d1232f61812a5f35a2dc595505590596503447e2ebc292f8a5fd234fb57e5e4fe9f74a0409fa571f849625f903d2f13dee98e549c402f5920b474fa

      • C:\Users\Admin\AppData\Local\Temp\rkjeiefs\rkjeiefs.dll

        Filesize

        3KB

        MD5

        ea14e65876c399d4e823db419c03541f

        SHA1

        add6edd313ecdf31e8bd941ed1afe70ec9183f81

        SHA256

        9a86c6a9487a268a350aa2170f7746768ae63332fe628f8ac0e62bde468d4792

        SHA512

        6341f5690ab4dbe013c3c2f5d35a65211f5e7692886f5205e7dbca4eb308077a9ad439507077a9a93b9a9a78d4f59da4532ee62cd521d2d44a361247d4246d3b

      • \??\c:\Users\Admin\AppData\Local\Temp\rkjeiefs\CSC7D0C891D926D445C89134E763C3A145E.TMP

        Filesize

        652B

        MD5

        26eb91f8871ae819ba4804625b85e6ed

        SHA1

        33e68d349c50df948c35e21de234ff988205eb54

        SHA256

        7d7a89ec5ae12bd3e9c695f4652044048e8e497f331dbce6f7939c3619553db7

        SHA512

        29f1ac4f6a384122b0126e03045fe99a49c6759e6bf188de4106ff189c15bfb1e373cf77cd5bf0500eaeda5529d99fab3a1493100d8de74967c04ada3848f141

      • \??\c:\Users\Admin\AppData\Local\Temp\rkjeiefs\rkjeiefs.0.cs

        Filesize

        737B

        MD5

        3d57f8f44297464baafa6aeecd3bf4bc

        SHA1

        f370b4b9f8dba01fbcad979bd663d341f358a509

        SHA256

        415199eec01052503978381a4f88f4cd970b441fedce519905990ed8b629b0f1

        SHA512

        4052dd65ca0a505a36c7c344671afcadb8f82cc24b0d1d8362f61565f9d37782e00332908444f6a95286dd1785d074762b27c20be1f361eec67807fad052d798

      • \??\c:\Users\Admin\AppData\Local\Temp\rkjeiefs\rkjeiefs.cmdline

        Filesize

        369B

        MD5

        a337d24323c007d2250381d5f9ac30e5

        SHA1

        6199a50bbad1d1fb8bef4a1e5669fdfeed78234c

        SHA256

        f569c5ff21eb22675275904905b455b8c06068eb4a439f08ec3212fb03cd9374

        SHA512

        9625751eff5996c3f1d5d432058506205b0d9c3665addf0fc1d15d7ac32523918e4cb945898ccb811f2177392e9a75544121a525057312458ba99810956a4447

      • memory/2460-26-0x00007FFD4F830000-0x00007FFD502F1000-memory.dmp

        Filesize

        10.8MB

      • memory/2460-48-0x0000021D58640000-0x0000021D58648000-memory.dmp

        Filesize

        32KB

      • memory/2460-14-0x00007FFD4F830000-0x00007FFD502F1000-memory.dmp

        Filesize

        10.8MB

      • memory/2460-52-0x00007FFD4F830000-0x00007FFD502F1000-memory.dmp

        Filesize

        10.8MB

      • memory/2460-13-0x0000021D58A60000-0x0000021D58A82000-memory.dmp

        Filesize

        136KB

      • memory/2460-11-0x00007FFD4F833000-0x00007FFD4F835000-memory.dmp

        Filesize

        8KB