Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/08/2024, 13:08

240809-qddpwavcqf 4

09/08/2024, 13:04

240809-qa6w9a1bqr 4

09/08/2024, 13:01

240809-p88m3a1bnk 4

Analysis

  • max time kernel
    63s
  • max time network
    64s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/08/2024, 13:01

Errors

Reason
Machine shutdown

General

  • Target

    Core-Temp-setup-v1.18.1.0.exe

  • Size

    1.2MB

  • MD5

    176642114ee7a82e0486bf5fac5777c0

  • SHA1

    f4329a1afc37f143ba1d39d9670ca4b1acd61c23

  • SHA256

    ca7d1365e934b3bd122ab8b0dbd24ef5e0c52471cfca15921555fc6b244e9ab6

  • SHA512

    dab12f11066bad3dcb2d6dfe599cdeab135ec8a69ba42fe157bf887c2c9ffea5615ac3661f5e011fb0ebf396930c9be84b1ee7987056189d0457f7a053a7a5dd

  • SSDEEP

    24576:686STfiCBXodcnZ+EshXP0QoZI0HGLeA8X2x/Us6oqK91BoQ9uZUR+zZdBq:oKBT+T0DA8XtnSpV9u1y

Score
4/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 12 IoCs
  • Executes dropped EXE 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Core-Temp-setup-v1.18.1.0.exe
    "C:\Users\Admin\AppData\Local\Temp\Core-Temp-setup-v1.18.1.0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\is-QJRF1.tmp\Core-Temp-setup-v1.18.1.0.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QJRF1.tmp\Core-Temp-setup-v1.18.1.0.tmp" /SL5="$80250,868100,121344,C:\Users\Admin\AppData\Local\Temp\Core-Temp-setup-v1.18.1.0.exe"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\Core Temp\Readme.txt
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1616
      • C:\Program Files\Core Temp\Core Temp.exe
        "C:\Program Files\Core Temp\Core Temp.exe"
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        PID:1028
  • C:\Program Files\Core Temp\Core Temp.exe
    "C:\Program Files\Core Temp\Core Temp.exe"
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:756
  • C:\Program Files\Core Temp\Core Temp.exe
    "C:\Program Files\Core Temp\Core Temp.exe"
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:4300
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3a1a055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:5016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Core Temp\Core Temp.exe

    Filesize

    1015KB

    MD5

    005727aa95c9f4899ea7673b114d91de

    SHA1

    ad96a46fe68428dc293db99b53a0593b6bc1d786

    SHA256

    26259a6f290a799eeb1c7c9b311e528c77e458582f9396d4dfc1c69dd2ad6891

    SHA512

    9e0dbb00b37e957114b7d74663600e041cad88d1940f4f3489e7eb7c347e51e8ede97ef054f5614f32facb5c6364b724a7781fb9047f190614718e8325952577

  • C:\Program Files\Core Temp\CoreTemp.ini

    Filesize

    1KB

    MD5

    94b56e0809f8b30af3aaae2a68f498b3

    SHA1

    a37a100fe91c0d9731f325994778d7c7c033451c

    SHA256

    23f972f8ab3952b2f891a41bd2d151d97016ca7bc9c78df30b1ab376211c66ec

    SHA512

    99f7142431b98bb09eb57db3437c0fa0ee75817de9c24eb294ce53ff1cd526d96ddf8c3d12d8ed524d9676cc90098c7565004468d205e9cd0d06aaa52c748ca0

  • C:\Program Files\Core Temp\Readme.txt

    Filesize

    3KB

    MD5

    9ab877751224d96448876f7ecf15559f

    SHA1

    59c910d91a64b2eee54997dc3fc54d8905b7748d

    SHA256

    abb84cf36bd0e8f39248f5477ca0d427da9b7e3c10b6666254b98d6e06b40e7b

    SHA512

    5c0684c21d7bb5500f9a1ed44b73b4e48755e5c7eaeebb8fa369a5fd6df2b21db127a76199598b3061a997919a7917116004190f6f0f7bceb5590e0a82baee78

  • C:\Users\Admin\AppData\Local\Temp\ALSysIO64.sys

    Filesize

    42KB

    MD5

    d9aafc513be1c4c57b9f9827e986039c

    SHA1

    2c688a6e881d35df958cb8ff2e2bd8e21b8461bc

    SHA256

    7a20ca8f9361eb892257b3693095ffeee61457dc4e22d9b119e3a9f3a1507069

    SHA512

    200a3df1ad0a18f5547e2f595f412f96d76040fa16de4720f76b305178a2bf9c944d31b5928dc2333d99a72fd617762e87885aa7e56719ccba2e7e593450f6fd

  • C:\Users\Admin\AppData\Local\Temp\is-QJRF1.tmp\Core-Temp-setup-v1.18.1.0.tmp

    Filesize

    1.1MB

    MD5

    34acc2bdb45a9c436181426828c4cb49

    SHA1

    5adaa1ac822e6128b8d4b59a54d19901880452ae

    SHA256

    9c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07

    SHA512

    134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb

  • memory/2472-6-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2472-9-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2472-34-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2472-55-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/3540-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3540-2-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/3540-1-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3540-56-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB