Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 09:02

General

  • Target

    siw.exe

  • Size

    2.2MB

  • MD5

    13dbc7b84232604ddaca90bb9296c9a8

  • SHA1

    030e9556494c2784f301fab8708e224c0e444106

  • SHA256

    fed89885f13bded6403daa145d2ef0e37824d1a21fbd44f738f5738f897bc70f

  • SHA512

    a5f158e92fd57a642a0bcc98913a0cbdf8e992850827c282e6c530333f8eea1124a399d1c1cb96161ebd1dada88417d81dd9870c831d340a1778da04d6522a52

  • SSDEEP

    49152:TmQGRlETbr3OYojfQjE3ZJS1emmMEwt2K3Dl2Dim:6dsbjff5EwoK3UDz

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\siw.exe
    "C:\Users\Admin\AppData\Local\Temp\siw.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2104
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:1980
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:1560

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\siw_sdk.dll

          Filesize

          1.1MB

          MD5

          7978755b3ae6b5becd725ea7a2fe28fd

          SHA1

          0d9b6052a8e592af158b6f76e785edccb579e4ea

          SHA256

          fe49ce098ce522c813dde21aa99351b0006b984499feda84490a9b7bddfac70a

          SHA512

          5ff2079060968efe4bf0485c2978f649e15c583c5f4f8f9a741fedf1f606e858afc2a577c6b4d93518ed52224fd124600aa4c9bf4cf6f042842f2b8da2a05faf

        • \Users\Admin\AppData\Local\Temp\sqlite3.dll

          Filesize

          508KB

          MD5

          0f66e8e2340569fb17e774dac2010e31

          SHA1

          406bb6854e7384ff77c0b847bf2f24f3315874a3

          SHA256

          de818c832308b82c2fabd5d3d4339c489e6f4e9d32bb8152c0dcd8359392695f

          SHA512

          39275df6e210836286e62a95ace7f66c7d2736a07b80f9b7e9bd2a716a6d074c79deae54e2d21505b74bac63df0328d6780a2129cdfda93aec1f75b523da9e05

        • memory/1984-1-0x0000000000020000-0x0000000000023000-memory.dmp

          Filesize

          12KB

        • memory/1984-0-0x0000000000400000-0x0000000000D6A000-memory.dmp

          Filesize

          9.4MB

        • memory/1984-13-0x0000000000400000-0x0000000000D6A000-memory.dmp

          Filesize

          9.4MB

        • memory/1984-14-0x0000000000400000-0x0000000000D6A000-memory.dmp

          Filesize

          9.4MB

        • memory/1984-15-0x0000000000020000-0x0000000000023000-memory.dmp

          Filesize

          12KB

        • memory/1984-17-0x0000000000400000-0x0000000000D6A000-memory.dmp

          Filesize

          9.4MB