Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 01:04

General

  • Target

    3a371ab7572283b1dbe360a3da148bd0N.exe

  • Size

    90KB

  • MD5

    3a371ab7572283b1dbe360a3da148bd0

  • SHA1

    489a21f1144f660a4058c9201f3e3b48558910db

  • SHA256

    9db2d0a43bd7a440891f9cc6c2c7d88068f0597626a4a30f33e35ea61ea663a8

  • SHA512

    e2a18e4ec8574e69c960736d716f2b54f764c157aab2609994b7bbfd413569a592aa14cbbd3f9167c8efcb1faa89218a8efb5ecc1a38173c55c73ca1d1e37b04

  • SSDEEP

    768:Qvw9816vhKQLron4/wQRNrfrunMxVFA3b7glw6:YEGh0onl2unMxVS3Hgl

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a371ab7572283b1dbe360a3da148bd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3a371ab7572283b1dbe360a3da148bd0N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\Windows\{794CE571-75D3-4abc-9E28-CEF62A4304D3}.exe
      C:\Windows\{794CE571-75D3-4abc-9E28-CEF62A4304D3}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Windows\{FC23871C-3681-492c-9B46-0C2F6FD841AB}.exe
        C:\Windows\{FC23871C-3681-492c-9B46-0C2F6FD841AB}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\Windows\{1AC40AA9-5F93-41ff-B53B-CC368480D76F}.exe
          C:\Windows\{1AC40AA9-5F93-41ff-B53B-CC368480D76F}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Windows\{00441579-4DB6-488d-ABD9-BB194AE871E1}.exe
            C:\Windows\{00441579-4DB6-488d-ABD9-BB194AE871E1}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4256
            • C:\Windows\{B8D2B5B1-A3D9-4c98-B494-1D6920D65ADE}.exe
              C:\Windows\{B8D2B5B1-A3D9-4c98-B494-1D6920D65ADE}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3740
              • C:\Windows\{1249C458-6EB8-4820-BD25-70718B94B03C}.exe
                C:\Windows\{1249C458-6EB8-4820-BD25-70718B94B03C}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4120
                • C:\Windows\{700790D1-3B03-468b-8461-682C52902E07}.exe
                  C:\Windows\{700790D1-3B03-468b-8461-682C52902E07}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:684
                  • C:\Windows\{308D0D3B-0134-4136-9A97-EE6B2B9F56CA}.exe
                    C:\Windows\{308D0D3B-0134-4136-9A97-EE6B2B9F56CA}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2256
                    • C:\Windows\{3F75893D-97EB-47c4-84E3-48241BC220DB}.exe
                      C:\Windows\{3F75893D-97EB-47c4-84E3-48241BC220DB}.exe
                      10⤵
                      • Executes dropped EXE
                      PID:4332
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{308D0~1.EXE > nul
                      10⤵
                        PID:4572
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{70079~1.EXE > nul
                      9⤵
                        PID:3736
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{1249C~1.EXE > nul
                      8⤵
                        PID:2360
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{B8D2B~1.EXE > nul
                      7⤵
                        PID:3244
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{00441~1.EXE > nul
                      6⤵
                        PID:3900
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{1AC40~1.EXE > nul
                      5⤵
                        PID:4300
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{FC238~1.EXE > nul
                      4⤵
                        PID:4996
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{794CE~1.EXE > nul
                      3⤵
                        PID:856
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\3A371A~1.EXE > nul
                      2⤵
                        PID:2468

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Windows\{00441579-4DB6-488d-ABD9-BB194AE871E1}.exe

                      Filesize

                      90KB

                      MD5

                      7da9556412037bfea4cfa3eb21fd9fce

                      SHA1

                      dcabb47b296849ba51003c63b818cb318a1ae184

                      SHA256

                      2e424ab74be821c5e6ff51d1cab0e40bed761204a8701e444298adc073fb2d26

                      SHA512

                      6d84db379afa73209ce37448dbb000e47a1579d94771a7c3647ceb40f7d968149135f05c46b1725a0526e6778590ba192a680a3789b240efaa67cfb054391b18

                    • C:\Windows\{1249C458-6EB8-4820-BD25-70718B94B03C}.exe

                      Filesize

                      90KB

                      MD5

                      a2e621e75a5e1e27706cc46c2889a057

                      SHA1

                      f6b528a15e64239b5d77b66c508719bd003dabf6

                      SHA256

                      d9f34be2e5eda8e072a37aaab7f886eed48f8f55ce7fa73e567656cd1ec10431

                      SHA512

                      0e6cc126691cfbc76a584b2e62ebb5ea572da67f9835662901a622072fb53e804eee910f381e74ed5561b297a7dd34622ba1a334ea3f2c274232a8ec527c7c21

                    • C:\Windows\{1AC40AA9-5F93-41ff-B53B-CC368480D76F}.exe

                      Filesize

                      90KB

                      MD5

                      b6c5ec2c48c45df150feaf467162c9b8

                      SHA1

                      6275ca2e876c41265e2041b0befc76a5dd47e2ed

                      SHA256

                      a81f0378173618833c4de18f0a1acd2c322461115a5c1d77c2697872a9317647

                      SHA512

                      4c5f7b5f2cc0e41aabe963e46dc682e0e3c638ac984ca6926ba63d96b9a424371bf3d824fd082e1abcc69953ee04ae39520295f92ddf17292bf34fcd2deb7005

                    • C:\Windows\{308D0D3B-0134-4136-9A97-EE6B2B9F56CA}.exe

                      Filesize

                      90KB

                      MD5

                      fd837e9ca8149b8d57f5e10e79b322f0

                      SHA1

                      554d05ee6f8c09a3ae08b9a6f196576a3a1b9757

                      SHA256

                      6488b0085dd00b72619466404dd9ffe50f378bfa9bdc2fda825ad57f5b5e443b

                      SHA512

                      0df27c1c2dcda1e1145b0807045cba68aa802ef3cd1e3c7c78686d683c6b8b53759f33585478028558d4bd821e98cf09e62be549b237cd8f7f80b19c0abfd618

                    • C:\Windows\{3F75893D-97EB-47c4-84E3-48241BC220DB}.exe

                      Filesize

                      90KB

                      MD5

                      662f18b855082cf881a80cdab121d746

                      SHA1

                      a474d366c279e8793604506afcfd1ad385775dcb

                      SHA256

                      f77242d0567e5f8a818f677bd1886fdf1c9c1e4edb07029e4a1462a3303843ab

                      SHA512

                      9a25d1ec0bd7057d8f4a7f743c0542e93d894bf582d1a6b83fbc020e20551bee9b1060e09b0a826ade87c142931e3bcd2db145b979bbdc8ac4c040836cd26141

                    • C:\Windows\{700790D1-3B03-468b-8461-682C52902E07}.exe

                      Filesize

                      90KB

                      MD5

                      f6fdc884e4ad7f31c4fbb0f85f12c4e4

                      SHA1

                      ab278fc3c03b109b0e6a4c91ce0dfe9359576c60

                      SHA256

                      ee0a31b8af13f8135dddf5b807dba0d0d3f2e64db032fa2ba194abf6db8e8e22

                      SHA512

                      8e83b8d4acea65deb0ba4918a306fd03daecbc62dbc07defabb450949e4263b7895c80832bedb629bb8878bf4a55ad2eccf4e9a64d62beea0ee01ba5aac4b7c2

                    • C:\Windows\{794CE571-75D3-4abc-9E28-CEF62A4304D3}.exe

                      Filesize

                      90KB

                      MD5

                      012c8ef225c913e838918c614218f1f6

                      SHA1

                      4c9fa3d5699dbd0c17d2fbee3e430d0295ba8d9e

                      SHA256

                      342cf597fd830e01bbf5c3ba95fa08d2dc1a46c3b60785cfc5840633f0e8c2be

                      SHA512

                      d565a92c94ca3b852601a2e53af4b8a8ac26325fb80ddad3f70ef73b6581f22cb735ca4bac909d649a8f7c8c70d85dab08d07d335f214e6f7ffc872339ed6911

                    • C:\Windows\{B8D2B5B1-A3D9-4c98-B494-1D6920D65ADE}.exe

                      Filesize

                      90KB

                      MD5

                      6dc0d9247992c8aed587ad3fe2ee69e6

                      SHA1

                      85c534e89e5bea165f5305371aa6eb971cc78feb

                      SHA256

                      41bfc754e8f262497697cf9db45f335486da173457babffa4e35aba50fa84322

                      SHA512

                      d25ff180354e97362721fb25f63201830cf9344c8bf90a50fcf1bd6151f75a955894ccd736ce9fcbb6d789f83311e9b5ffb22af24b2d1c5dccd91017056656f4

                    • C:\Windows\{FC23871C-3681-492c-9B46-0C2F6FD841AB}.exe

                      Filesize

                      90KB

                      MD5

                      e8215b27e447f48b234a552987f93686

                      SHA1

                      ceac9713d26df11f0565d19b584816992a6e8403

                      SHA256

                      e1e6e6ff8799b2a68a9bcdb1341c524503be39d1423dfcfbd0703c7e6f8489ac

                      SHA512

                      59ac3a40573ebc556a1c3092d63ea0324eee802197bae0a127577bd69b2a6e5eb45b86998e601859abe6296b660edfe1097da0f6ec6f79d543194fcccd914bdd