Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 16:03

General

  • Target

    e5a424c127b1787ee70d6e8536046730N.exe

  • Size

    89KB

  • MD5

    e5a424c127b1787ee70d6e8536046730

  • SHA1

    148bde2358c4dd2bf3dc7e569b0bef1d4ddc2b3e

  • SHA256

    2c052a04edc60fd3d3506ed29b0940519ec0456bbfe5a11a232d27792565aa88

  • SHA512

    08d57069d4d15866f52574fce6ac0bcc30e26f027e5cbaf66cfed06d2cd9dec6121058209892cbe0553f9422a1a149f133e581d353ce8711951c6896006669db

  • SSDEEP

    768:Qvw9816vhKQLroq4/wQRNrfrunMxVFA3b7glL:YEGh0oql2unMxVS3Hg9

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5a424c127b1787ee70d6e8536046730N.exe
    "C:\Users\Admin\AppData\Local\Temp\e5a424c127b1787ee70d6e8536046730N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\{73E69B42-DDB1-41e3-9972-919C6C157661}.exe
      C:\Windows\{73E69B42-DDB1-41e3-9972-919C6C157661}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:708
      • C:\Windows\{EAD3E508-A437-47ab-A113-D6091CE9D7F8}.exe
        C:\Windows\{EAD3E508-A437-47ab-A113-D6091CE9D7F8}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\{959417DA-1B46-4cee-9CBB-13447427C76F}.exe
          C:\Windows\{959417DA-1B46-4cee-9CBB-13447427C76F}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4248
          • C:\Windows\{E9ADBE75-5CCA-4c1f-B743-19C2367C05A0}.exe
            C:\Windows\{E9ADBE75-5CCA-4c1f-B743-19C2367C05A0}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3540
            • C:\Windows\{8734F4CD-0572-4231-A811-1B84B48D9408}.exe
              C:\Windows\{8734F4CD-0572-4231-A811-1B84B48D9408}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2968
              • C:\Windows\{A021524D-858F-4c61-8D74-B368BAB36A38}.exe
                C:\Windows\{A021524D-858F-4c61-8D74-B368BAB36A38}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2116
                • C:\Windows\{2B63280B-8BED-4ded-954E-B7903CD93695}.exe
                  C:\Windows\{2B63280B-8BED-4ded-954E-B7903CD93695}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4140
                  • C:\Windows\{E314CB59-D125-4f2a-A860-91DEEEA8386E}.exe
                    C:\Windows\{E314CB59-D125-4f2a-A860-91DEEEA8386E}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3536
                    • C:\Windows\{0594D170-1D2F-42c4-A5C7-CDE4832AA736}.exe
                      C:\Windows\{0594D170-1D2F-42c4-A5C7-CDE4832AA736}.exe
                      10⤵
                      • Executes dropped EXE
                      PID:4584
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{E314C~1.EXE > nul
                      10⤵
                        PID:1956
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{2B632~1.EXE > nul
                      9⤵
                        PID:2684
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{A0215~1.EXE > nul
                      8⤵
                        PID:4860
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{8734F~1.EXE > nul
                      7⤵
                        PID:2732
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{E9ADB~1.EXE > nul
                      6⤵
                        PID:4420
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{95941~1.EXE > nul
                      5⤵
                        PID:3532
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{EAD3E~1.EXE > nul
                      4⤵
                        PID:3960
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{73E69~1.EXE > nul
                      3⤵
                        PID:508
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\E5A424~1.EXE > nul
                      2⤵
                        PID:3540

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Windows\{0594D170-1D2F-42c4-A5C7-CDE4832AA736}.exe

                      Filesize

                      89KB

                      MD5

                      5f80856ee968ba0f9cad2202e0d45280

                      SHA1

                      d5a4fc64f0472a71dc764c501cb957efd5d3a7b3

                      SHA256

                      b771d43a86e0b560f300f525a17a6a136ea81b78a49e5e76cb2757168ae50c44

                      SHA512

                      0048f4e8a97dcba3f74eb187d5069b6eebcb9983e4fdae3aae569d7994214d5b266879c50d5c92475e2dd322ead4b19a91a6ade322fd93ed7f9a1a9254480b17

                    • C:\Windows\{2B63280B-8BED-4ded-954E-B7903CD93695}.exe

                      Filesize

                      89KB

                      MD5

                      b81eb524a85d0345c6e251bc6cc6c804

                      SHA1

                      2c92472a3ed294d30788fe3ae69e0678f721000b

                      SHA256

                      37671e0b18324dbc444b884f13af131dc46ef10aaad3f92d8b7d74632bd684fb

                      SHA512

                      40276be127d2bec9373dce10b06c32af8f55b88d74db481bb6dad2ecb35fc765272518684e1653d70ae568264071a3d2af4d68b693c9d1d2d12349d25d14c2a3

                    • C:\Windows\{73E69B42-DDB1-41e3-9972-919C6C157661}.exe

                      Filesize

                      89KB

                      MD5

                      f47252ce5e46ff225a701225eafaf1d8

                      SHA1

                      fc51f2c2eb0b0477dfc79981c0c6514ba333dff7

                      SHA256

                      ace06db31535daa668bdba9a9d61f4137c50a46d439265df8306eacb1bba7563

                      SHA512

                      4e9ee65582fa20fb22caea4600efe98e763432ea64a7d100467d9f7ba357e4448c20f3203b21be22841f9bf26b492bb940cf07cdec5918ae1aa191b839341915

                    • C:\Windows\{8734F4CD-0572-4231-A811-1B84B48D9408}.exe

                      Filesize

                      89KB

                      MD5

                      6050525b100cbdc22488d89a857a1efc

                      SHA1

                      60d17d2e75a174da10b381683979dab7b0de64a0

                      SHA256

                      a140500063968e3be134cc2da860da5cd48cc5e2ccfd151f64968e0049722f6a

                      SHA512

                      a729cf40f976b680e64538921935e8d65ab6796fe78a9a519904b569bf81b83fe06ed03222f3c1004b17a34f158cb86080a4c2b6bf51990dfbd778168e71c1e5

                    • C:\Windows\{959417DA-1B46-4cee-9CBB-13447427C76F}.exe

                      Filesize

                      89KB

                      MD5

                      515ee8d585e5e8c0faad0138f1ab4b26

                      SHA1

                      a1bd26f9a910e1cd6153eee3a437953b58ab053a

                      SHA256

                      28739a2798c178ab3026180001578f77d189403f2bed6d52a5c406ea6b48f4de

                      SHA512

                      cc93be33dccf47e4b3250ac0725a1ce7a457979051fce400cf0eb9c9e752216792b06da5bdf66963282ec12823b8522dc54d5de8e82cdbe11ebe13dc5acc8603

                    • C:\Windows\{A021524D-858F-4c61-8D74-B368BAB36A38}.exe

                      Filesize

                      89KB

                      MD5

                      1fa162366206019c2daeb42291b14639

                      SHA1

                      da879d1673d0ce40b4711f987727b9af038837ca

                      SHA256

                      cbcc5ac701f717ebb95ed1a404b7256b6bb507943eade50df94d5e0d0bbacd65

                      SHA512

                      af81cfbb0462929ff7197509b9d3eae853e9523648a1fb0385d26840d3ec93c83010a5cbb45176ff952a75512f9a67fd45531154898d86864a120b6cee5ce860

                    • C:\Windows\{E314CB59-D125-4f2a-A860-91DEEEA8386E}.exe

                      Filesize

                      89KB

                      MD5

                      871ed2f81bc66d0b253123d64fca2c04

                      SHA1

                      7d917163d68f7b25d0eb4fb38665f187947b2cbe

                      SHA256

                      00a1fb61f31ca07a76bbded5c3be37ad64bd86ac7b3a60b884f463511f6000d1

                      SHA512

                      b67f95edf3c658f9fe5f40f9379d8f6f641a772ed45fcc16c216548d4c28d6d220c99d16391c035b001a41aa213ca26576248cd13416fc8e4e7b125b0ce4da9e

                    • C:\Windows\{E9ADBE75-5CCA-4c1f-B743-19C2367C05A0}.exe

                      Filesize

                      89KB

                      MD5

                      abfbf6e97801f6b7a196e9c347df12c6

                      SHA1

                      06dcb878054c8f6ada190488885d4f9acb3af4ea

                      SHA256

                      0124c325a3110d26e789432c55ec3201fdde5ea126e54c30dfba49767b1d6ec0

                      SHA512

                      3abfc43ac209e1cc6e1d02b9a5766237f2004ab469d147fe5f496d38cf52692fdcaa9b6ed382c06dcdd2cbf9739c6d14f4fe6f2cc66427b51f3b67664773faa1

                    • C:\Windows\{EAD3E508-A437-47ab-A113-D6091CE9D7F8}.exe

                      Filesize

                      89KB

                      MD5

                      3060266ec13a49b10051967a5231bfa8

                      SHA1

                      5a98fce1441adb853bc6fa30ab8b1d70f83fae3e

                      SHA256

                      d41247f5083665f302a808322262c75fc409b3b7499c433075b991b82aabb502

                      SHA512

                      f17d6c389bcc439f30ed3633f90952e6c2dee8509c81e23f80463eb232fbc4665b011046bb52ee85ce96f5edbfd2b7bb934190901a7e59741d690766f4044ccd