Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    70s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15/08/2024, 04:02 UTC

General

  • Target

    d804e70c7b5fd8d9c308278e03dc94a0N.exe

  • Size

    1.2MB

  • MD5

    d804e70c7b5fd8d9c308278e03dc94a0

  • SHA1

    965eb9430e085481861b927cc721a33bcc1d62e8

  • SHA256

    044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88

  • SHA512

    147d4ae3d763c97352077768c083419133d10ebf8a19a3eb9516ad8584891ff0628ad7ab2967e85278ecdb857a311435069d25c43c7dac3479edfc22b0687b84

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU9+s8juCCCqR:E5aIwC+Agr6SNasrsFCZqR

Malware Config

Signatures

  • KPOT

    KPOT is an information stealer that steals user data and account credentials.

  • KPOT Core Executable 1 IoCs
  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 1 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d804e70c7b5fd8d9c308278e03dc94a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d804e70c7b5fd8d9c308278e03dc94a0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SysWOW64\cmd.exe
      /c sc stop WinDefend
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\sc.exe
        sc stop WinDefend
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:2132
    • C:\Windows\SysWOW64\cmd.exe
      /c sc delete WinDefend
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\SysWOW64\sc.exe
        sc delete WinDefend
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:752
    • C:\Windows\SysWOW64\cmd.exe
      /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Set-MpPreference -DisableRealtimeMonitoring $true
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
    • C:\Users\Admin\AppData\Roaming\WinSocket\d904e80c8b6fd9d9c309289e03dc94a0N.exe
      C:\Users\Admin\AppData\Roaming\WinSocket\d904e80c8b6fd9d9c309289e03dc94a0N.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:1340
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {9BACF556-23E5-402C-8DAE-24D532284D73} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Users\Admin\AppData\Roaming\WinSocket\d904e80c8b6fd9d9c309289e03dc94a0N.exe
        C:\Users\Admin\AppData\Roaming\WinSocket\d904e80c8b6fd9d9c309289e03dc94a0N.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:556
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe
          3⤵
            PID:2076

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Roaming\WinSocket\d904e80c8b6fd9d9c309289e03dc94a0N.exe

        Filesize

        1.2MB

        MD5

        d804e70c7b5fd8d9c308278e03dc94a0

        SHA1

        965eb9430e085481861b927cc721a33bcc1d62e8

        SHA256

        044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88

        SHA512

        147d4ae3d763c97352077768c083419133d10ebf8a19a3eb9516ad8584891ff0628ad7ab2967e85278ecdb857a311435069d25c43c7dac3479edfc22b0687b84

      • memory/556-71-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-72-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-67-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-68-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-70-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-69-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-65-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-66-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-61-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-62-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-64-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/556-63-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/1340-49-0x0000000010000000-0x000000001001E000-memory.dmp

        Filesize

        120KB

      • memory/1340-50-0x0000000010000000-0x000000001001E000-memory.dmp

        Filesize

        120KB

      • memory/2632-6-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-13-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-17-0x0000000000421000-0x0000000000422000-memory.dmp

        Filesize

        4KB

      • memory/2632-15-0x0000000000310000-0x0000000000339000-memory.dmp

        Filesize

        164KB

      • memory/2632-14-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-3-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-4-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-5-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-2-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-12-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-11-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-10-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-9-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-8-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-7-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/2632-18-0x0000000000400000-0x0000000000472000-memory.dmp

        Filesize

        456KB

      • memory/2832-39-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-30-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-31-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-32-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-33-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-34-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-35-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-36-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-37-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-38-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-40-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      • memory/2832-44-0x0000000000400000-0x0000000000472000-memory.dmp

        Filesize

        456KB

      • memory/2832-45-0x0000000010000000-0x0000000010007000-memory.dmp

        Filesize

        28KB

      • memory/2832-41-0x0000000000480000-0x0000000000481000-memory.dmp

        Filesize

        4KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.