Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/08/2024, 22:19

240817-18gp5ashrj 6

17/08/2024, 22:16

240817-16wq9szgka 6

Analysis

  • max time kernel
    27s
  • max time network
    17s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/08/2024, 22:19

General

  • Target

    Hydrox.exe

  • Size

    53KB

  • MD5

    4c1412dd7a652cab42eddc0f5ad40481

  • SHA1

    87c3b402ebde470cbdc23d7f02557cccc8266cc3

  • SHA256

    eac3da5445657fcc4e86d8912eeb4481654fb307a057d74c121d258c4335d799

  • SHA512

    439020d7bb79d70818a89a78fee75f13e0bd3b4808d7ef11df6d394be90772205dbd38fa74869ff8592f025b845565e918e38d86311fedb607fecfbd7feb3057

  • SSDEEP

    768:vIKreLkaLvjBQc2cBjF5Yt7nRWd7wNOZ3GBDIqDtZl2m+o1I0Ivkyp/ZqV1XoLhF:DsdQcTxKchwsgVvU0IvkwhC1EF

Score
6/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hydrox.exe
    "C:\Users\Admin\AppData\Local\Temp\Hydrox.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" bcdedit -set {current} path \get\fucked.efi
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xj3lq4ni.wga.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\Desktop\Script.txt

    Filesize

    2B

    MD5

    81051bcc2cf1bedf378224b0a93e2877

    SHA1

    ba8ab5a0280b953aa97435ff8946cbcbb2755a27

    SHA256

    7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

    SHA512

    1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

  • memory/2228-40-0x0000000009160000-0x0000000009193000-memory.dmp

    Filesize

    204KB

  • memory/2228-19-0x0000000007970000-0x00000000079D6000-memory.dmp

    Filesize

    408KB

  • memory/2228-246-0x0000000009410000-0x0000000009418000-memory.dmp

    Filesize

    32KB

  • memory/2228-17-0x0000000007130000-0x0000000007152000-memory.dmp

    Filesize

    136KB

  • memory/2228-48-0x0000000009480000-0x0000000009514000-memory.dmp

    Filesize

    592KB

  • memory/2228-47-0x00000000092A0000-0x0000000009345000-memory.dmp

    Filesize

    660KB

  • memory/2228-42-0x0000000009140000-0x000000000915E000-memory.dmp

    Filesize

    120KB

  • memory/2228-22-0x0000000008320000-0x000000000836B000-memory.dmp

    Filesize

    300KB

  • memory/2228-41-0x000000006E050000-0x000000006E09B000-memory.dmp

    Filesize

    300KB

  • memory/2228-15-0x0000000004A30000-0x0000000004A66000-memory.dmp

    Filesize

    216KB

  • memory/2228-16-0x0000000007180000-0x00000000077A8000-memory.dmp

    Filesize

    6.2MB

  • memory/2228-20-0x00000000079E0000-0x0000000007D30000-memory.dmp

    Filesize

    3.3MB

  • memory/2228-23-0x00000000080B0000-0x0000000008126000-memory.dmp

    Filesize

    472KB

  • memory/2228-241-0x0000000009420000-0x000000000943A000-memory.dmp

    Filesize

    104KB

  • memory/2228-18-0x0000000007900000-0x0000000007966000-memory.dmp

    Filesize

    408KB

  • memory/2228-21-0x0000000007DB0000-0x0000000007DCC000-memory.dmp

    Filesize

    112KB

  • memory/3404-9-0x00000000735EE000-0x00000000735EF000-memory.dmp

    Filesize

    4KB

  • memory/3404-3-0x0000000004CE0000-0x0000000004D72000-memory.dmp

    Filesize

    584KB

  • memory/3404-2-0x0000000005100000-0x00000000055FE000-memory.dmp

    Filesize

    5.0MB

  • memory/3404-0-0x00000000735EE000-0x00000000735EF000-memory.dmp

    Filesize

    4KB

  • memory/3404-10-0x00000000735E0000-0x0000000073CCE000-memory.dmp

    Filesize

    6.9MB

  • memory/3404-8-0x00000000735E0000-0x0000000073CCE000-memory.dmp

    Filesize

    6.9MB

  • memory/3404-7-0x00000000735E0000-0x0000000073CCE000-memory.dmp

    Filesize

    6.9MB

  • memory/3404-6-0x00000000735E0000-0x0000000073CCE000-memory.dmp

    Filesize

    6.9MB

  • memory/3404-5-0x00000000735E0000-0x0000000073CCE000-memory.dmp

    Filesize

    6.9MB

  • memory/3404-4-0x0000000004CB0000-0x0000000004CBA000-memory.dmp

    Filesize

    40KB

  • memory/3404-1-0x0000000000440000-0x0000000000454000-memory.dmp

    Filesize

    80KB