Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 04:20

General

  • Target

    530a6ea9e6b9832b4e4240312ff509a0N.exe

  • Size

    90KB

  • MD5

    530a6ea9e6b9832b4e4240312ff509a0

  • SHA1

    4f03b3c0db585f8a1f445bd98de6aea9919de548

  • SHA256

    91ca7c533b28ab0358dd290ebc8a8f87e38decbd9841b1a0ae93cd1ebbe60523

  • SHA512

    48f2a6b78efc1d3b3e8eecfd864797af08e2eb35f1869c822d0cb69d07038733b6d5238249a17b4b05f789d5d8c0598b6da171e06800f4a3a3c0ddfbab798131

  • SSDEEP

    768:Qvw9816vhKQLroQ4/wQRNrfrunMxVFA3b7glw6:YEGh0oQl2unMxVS3Hgl

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\530a6ea9e6b9832b4e4240312ff509a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\530a6ea9e6b9832b4e4240312ff509a0N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\{B0D161FB-D76A-4e4c-A807-D5E796EA3BE5}.exe
      C:\Windows\{B0D161FB-D76A-4e4c-A807-D5E796EA3BE5}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Windows\{3F68C063-8ED9-4853-93D5-FCD928FC10FF}.exe
        C:\Windows\{3F68C063-8ED9-4853-93D5-FCD928FC10FF}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1876
        • C:\Windows\{C62748AB-3AB0-4b8f-B3C4-D0E00750FAA2}.exe
          C:\Windows\{C62748AB-3AB0-4b8f-B3C4-D0E00750FAA2}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\{A8ED674A-1BBC-429c-B13F-C7AC2D10E9CC}.exe
            C:\Windows\{A8ED674A-1BBC-429c-B13F-C7AC2D10E9CC}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Windows\{CD98F2DE-19DF-4e05-8F36-BA0013AF6928}.exe
              C:\Windows\{CD98F2DE-19DF-4e05-8F36-BA0013AF6928}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Windows\{874D7689-8132-4e51-AA42-2AD9EB1CBDEE}.exe
                C:\Windows\{874D7689-8132-4e51-AA42-2AD9EB1CBDEE}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1796
                • C:\Windows\{272B0EE9-32F7-4517-864D-D04153BAB958}.exe
                  C:\Windows\{272B0EE9-32F7-4517-864D-D04153BAB958}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1616
                  • C:\Windows\{0CE2E580-E769-4200-B37C-D4D8F45CB910}.exe
                    C:\Windows\{0CE2E580-E769-4200-B37C-D4D8F45CB910}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1696
                    • C:\Windows\{0CDAD9BF-4140-471c-A30A-BCB35AF4D78C}.exe
                      C:\Windows\{0CDAD9BF-4140-471c-A30A-BCB35AF4D78C}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2964
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{0CE2E~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:2992
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{272B0~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:1668
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{874D7~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2024
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{CD98F~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2784
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{A8ED6~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2212
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{C6274~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2772
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{3F68C~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2480
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{B0D16~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2752
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\530A6E~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{0CDAD9BF-4140-471c-A30A-BCB35AF4D78C}.exe

    Filesize

    90KB

    MD5

    80994ef0f0bf3b5fd08248a4abcd4cf2

    SHA1

    f3e608dedbeda098b42a742473c41c0325edfca4

    SHA256

    afe84d0b6b97ed626ba6a9e8cd3f8f445b55188a5fbe19482000cdf5c1f3ad10

    SHA512

    329ce081b110f3cfa7b6479f612030721e1869dcf4e41fcdb13aad7521bfcbc5382032220a199cb600597ddae18606221ec3ea34e8f7605fbee68af887d13619

  • C:\Windows\{0CE2E580-E769-4200-B37C-D4D8F45CB910}.exe

    Filesize

    90KB

    MD5

    e90731be5de49d3b692de8232e05e2ba

    SHA1

    57767e37061fddc5a80418b3a4d145ad364c7aaa

    SHA256

    d893b0b4a4a936d7a94fca33f79f6c1050eb78d9fc7ce055a4e0c4eb5881a062

    SHA512

    cb2d4cc4aff318a68d16bc572d19de4a091278271070d98e3cd928530483aee26cb3c4f8627c933492aeaeef69897fde18bd1f3ad1bce1dc8cbde911ecf96083

  • C:\Windows\{272B0EE9-32F7-4517-864D-D04153BAB958}.exe

    Filesize

    90KB

    MD5

    08d90742d48f44fca65cc96bbe688709

    SHA1

    b5da1d75dc542bf92d7ca25739b20dffebfdb9a1

    SHA256

    83b0440dc7a8b6a83f8d64c341e3420b4f7d74a86866e85aaa06010975d46d53

    SHA512

    4e84a7bd1f6fa3da23bfc71d59e892beaa86fa5319560c91f2118d4e42069886d53a033fca7cb6160e394f58ea982794bacd2bb2fce5f5c0cab4517e7da072dd

  • C:\Windows\{3F68C063-8ED9-4853-93D5-FCD928FC10FF}.exe

    Filesize

    90KB

    MD5

    07dc29b188d3c6462f08fbb97e7a9cda

    SHA1

    9fa9f1fe462031a40fe555dd495f9e347c76c35a

    SHA256

    b3e86bf0ab28e53b01dae46308ae3016d7629635404037cc382a1461e3e9139a

    SHA512

    ffc9ea5e6b54d0035c14a11dab76a01d80bf059ed867c51fe4fcfd519000c5c6ced88d5a8d2d58e3db257fa051f00d58f782c276552a83d9bd8d4d6e7c54e5b6

  • C:\Windows\{874D7689-8132-4e51-AA42-2AD9EB1CBDEE}.exe

    Filesize

    90KB

    MD5

    67b5b898f5f28984bebc2a7f7aad19bb

    SHA1

    9bc7d7f674de3801229ba4c4526cb5763a9694b5

    SHA256

    9c857e152683061e62c4c3f6ce6f76d2363e4a77ced5db9e70274ed6d69dc24e

    SHA512

    9dbd33c9c6759993e966ff42b224b813699efaba136e7c64594f0e3813c26167d5cb937b6fda509198bd554dbda5f89b3f1835469911ea6c9048da51234c2230

  • C:\Windows\{A8ED674A-1BBC-429c-B13F-C7AC2D10E9CC}.exe

    Filesize

    90KB

    MD5

    b363779da33f41090e1a6fdfab93dd91

    SHA1

    4e5711113a605a2e65e07801cf632b4336147f7c

    SHA256

    4ed1880ef4d93eebc5b241b0e986359509866cc765a2a1c6027055e6e6b5b360

    SHA512

    ed377af481df48ebeb2dd7dc4d9bc734d4f9b8f3ad8e47a8ae4872a11ccc2da1bb73cde3a5432166fbceecc0cc7cd504a3c04724ce3d8d3c0d9e9412a76d26d3

  • C:\Windows\{B0D161FB-D76A-4e4c-A807-D5E796EA3BE5}.exe

    Filesize

    90KB

    MD5

    622bb211d8ce70c52a98798c20dbe841

    SHA1

    383b668d61ec1d946445d3a86cba01b19fec86d6

    SHA256

    53c44df96509eacf285e6bf0f015797f9a632ad172bf331c7d09b6f4594534dd

    SHA512

    e11dd26336107951197d2e9c8543a61fdb79197a640c6ab586985e466003bfdb42988f25241997a26fa9e32fb2179febe6ca693571a580305a8cf9e1f2439d97

  • C:\Windows\{C62748AB-3AB0-4b8f-B3C4-D0E00750FAA2}.exe

    Filesize

    90KB

    MD5

    648b9d630e987679017175e75234d0b2

    SHA1

    3c7c6af2836a03dd32912b4460f9a020eb8d59e5

    SHA256

    f9612f8fc4c2aa5181cfadc75fa0e0b6743c0d4fbe730e448bb5d2060377bed8

    SHA512

    f5c4ab5c3b91384a2a6eb4ebd48aef0e40dc3292d642b33739da9460be1579056b5695ac6cf713a4040f6a680d78208d9fb55753c4e2f6c747f2fb0231d8a44e

  • C:\Windows\{CD98F2DE-19DF-4e05-8F36-BA0013AF6928}.exe

    Filesize

    90KB

    MD5

    198efd22fd487db91eacfa3b33a02b57

    SHA1

    9a1f60b3fb77fb0a3e1fd971f25aafcfc029de62

    SHA256

    9aaa8c68a9140fb2f6089724d23b6432e43aca6e40a26701317c183dc45f721c

    SHA512

    f344b3b5a2946df8b09c8e4f3efccd670490755cf5a8c5219ea98d734791bc57a3f9e25aab770c570407d1d622192c82f3b8fc2fac7ccba22f31e628ef8a7352