Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 03:29

General

  • Target

    SKTGHRO77395797593759737593759375793753957Slummet55.exe

  • Size

    481KB

  • MD5

    6304403095a696f2c74a7e022ee18af6

  • SHA1

    a69d59aab5a94699ce0e5dea6304cb031f8d7c79

  • SHA256

    0a5611401f99d5b7ce0b7d1e13bda3e0e908abb487987c1c7d3d667f3c4c4e16

  • SHA512

    0d78df6576c24326fbd220bf7a116b52ceb57c6f1d86025c6b58b3c6e9de0b6a4cd79947a5aa59468033e45860eeebc6400c7704caa81911f24a8b79acf49c79

  • SSDEEP

    12288:FY1nHGrmqu9HZS05uwGStaQ5Y7JJRMgTAUdey43gqt5R:FY5HGrmqoMfwN5Y7JJA/35

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKTGHRO77395797593759737593759375793753957Slummet55.exe
    "C:\Users\Admin\AppData\Local\Temp\SKTGHRO77395797593759737593759375793753957Slummet55.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Theorizers=Get-Content 'C:\Users\Admin\AppData\Local\potaskens\ugentlige\Synkronmotorernes\Swarthiness.Mor204';$Anneths163=$Theorizers.SubString(3987,3);.$Anneths163($Theorizers)"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Users\Admin\AppData\Local\Temp\Impulsory.exe
        "C:\Users\Admin\AppData\Local\Temp\Impulsory.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:1368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\potaskens\ugentlige\Synkronmotorernes\Corbiculum152.Gan

    Filesize

    367KB

    MD5

    9a262156e0c02952a4d95e35dcc68eac

    SHA1

    921c0335bf2cfee0fd2eee9f81d3b2bb6b176c7c

    SHA256

    c9f6393d23bd17d6e4a213bf0293750bd1d7e4e17c8061fb550a145e29cfa449

    SHA512

    c7ca0a2d1f23294b72430933a0cf6988926a28cdeec77c3ba73797f15b3c831782b7fdf86b307bdf59d37ba4097e48615df380ed6f9ebb2d694713bedbf77fef

  • C:\Users\Admin\AppData\Local\potaskens\ugentlige\Synkronmotorernes\Swarthiness.Mor204

    Filesize

    56KB

    MD5

    0b828f90d4a23ca0f2141e135a7b50b7

    SHA1

    d69a8fdfdd74b315c42e6a854773d8eb6bb3ca2f

    SHA256

    d25e8f1e81bf5a143523ccf23bbaa796d3a1d00fb944ecfe8f9f3119828c4a57

    SHA512

    b040903dbda02b94e672bb655818a020e535c1b414db3625e97a9c8b9a4f53374e426a0108697953e322593e0cbc0f5b5a41a9a3e843fc4ff329cec7b50ac250

  • \Users\Admin\AppData\Local\Temp\Impulsory.exe

    Filesize

    481KB

    MD5

    6304403095a696f2c74a7e022ee18af6

    SHA1

    a69d59aab5a94699ce0e5dea6304cb031f8d7c79

    SHA256

    0a5611401f99d5b7ce0b7d1e13bda3e0e908abb487987c1c7d3d667f3c4c4e16

    SHA512

    0d78df6576c24326fbd220bf7a116b52ceb57c6f1d86025c6b58b3c6e9de0b6a4cd79947a5aa59468033e45860eeebc6400c7704caa81911f24a8b79acf49c79

  • memory/1368-39-0x0000000001470000-0x00000000049F4000-memory.dmp

    Filesize

    53.5MB

  • memory/1368-28-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/1368-27-0x0000000000400000-0x0000000001462000-memory.dmp

    Filesize

    16.4MB

  • memory/2156-17-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-18-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-10-0x0000000073F61000-0x0000000073F62000-memory.dmp

    Filesize

    4KB

  • memory/2156-20-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-22-0x0000000006280000-0x0000000009804000-memory.dmp

    Filesize

    53.5MB

  • memory/2156-14-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-13-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-12-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-11-0x0000000073F60000-0x000000007450B000-memory.dmp

    Filesize

    5.7MB