Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/08/2024, 00:49

240817-a6d84s1arp 3

17/08/2024, 00:45

240817-a4km4sxcnc 4

17/08/2024, 00:41

240817-a19g3axblb 3

16/08/2024, 15:13

240816-slrb2s1fra 3

Analysis

  • max time kernel
    278s
  • max time network
    276s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17/08/2024, 00:49

General

  • Target

    b87c096c10d4c1fe5c58e32574a0cc5430e3e1bd65e027b602cd0c8b00d81931.exe

  • Size

    410KB

  • MD5

    18152e40100de9cafb257df76f17e51e

  • SHA1

    a310b69302d0945e5b4dcc02692c646a045bbf06

  • SHA256

    b87c096c10d4c1fe5c58e32574a0cc5430e3e1bd65e027b602cd0c8b00d81931

  • SHA512

    be22cdb522df9fe45cbb14db384fcfebfdcd520622455958f6b49f613186c440eb184c6bb2128976377aff02833df153df48f6c8d180ea3bda9bd3047165b0e1

  • SSDEEP

    12288:hHsEjxLDavg3JmwxY1kzE+QIrZoftjNB:lsA+vSoqYAQmZoftn

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b87c096c10d4c1fe5c58e32574a0cc5430e3e1bd65e027b602cd0c8b00d81931.exe
    "C:\Users\Admin\AppData\Local\Temp\b87c096c10d4c1fe5c58e32574a0cc5430e3e1bd65e027b602cd0c8b00d81931.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4464
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /0
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3820
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2060
    • C:\Windows\System32\RuntimeBroker.exe
      "C:\Windows\System32\RuntimeBroker.exe"
      1⤵
        PID:4528
      • C:\Windows\System32\RuntimeBroker.exe
        "C:\Windows\System32\RuntimeBroker.exe"
        1⤵
          PID:2416
        • C:\Windows\System32\e4ozbkotpwqgu.exe
          "C:\Windows\System32\e4ozbkotpwqgu.exe"
          1⤵
            PID:948
          • C:\Windows\System32\yqj9q3.exe
            "C:\Windows\System32\yqj9q3.exe"
            1⤵
              PID:2244
            • C:\Windows\System32\yqj9q3.exe
              "C:\Windows\System32\yqj9q3.exe"
              1⤵
                PID:916
              • C:\Windows\System32\yqj9q3.exe
                "C:\Windows\System32\yqj9q3.exe"
                1⤵
                  PID:1740
                • C:\Windows\System32\yqj9q3.exe
                  "C:\Windows\System32\yqj9q3.exe"
                  1⤵
                    PID:1464
                  • C:\Windows\System32\e4ozbkotpwqgu.exe
                    "C:\Windows\System32\e4ozbkotpwqgu.exe"
                    1⤵
                      PID:4824
                    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                      1⤵
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:2008

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                      Filesize

                      10KB

                      MD5

                      a7f391566ceb7d310b04c1376aa66a07

                      SHA1

                      eda88e9134d3de209152481c9e8aa02054d4c2eb

                      SHA256

                      8ecb81fa22792fa6bb09abc86b9b5afb50773e2c5537def45dd8ba297f6c714e

                      SHA512

                      163bad20eaa9108286367367e6a54a9ac612026954ee2466b8f88f732a992695fe160d3fb5f092976ef15c1c1b71400e577a9a4833dfa616d7c9ee6a8237033c

                    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                      Filesize

                      10KB

                      MD5

                      7fc1af6f45e844eedd1a78d89ba2813d

                      SHA1

                      bdd93c47e99e7da95f5888d01cb85550f8fae9ab

                      SHA256

                      87577decf9290f786d76c3e9885e490106a7b00dd8a9b43471ff32f9eddd612e

                      SHA512

                      e79bc304620d23981c9bc03ada331755eaf74f356f32461bced715ef6e5c3ceab947a5a1dc51ef9061427b5c9132f58b1c14cce33960dd469c066ec4458abe86

                    • memory/3820-2-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3820-1-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3820-0-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3820-8-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3820-12-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3820-11-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3820-10-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3820-9-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3820-7-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3820-6-0x000001F9D7FE0000-0x000001F9D7FE1000-memory.dmp

                      Filesize

                      4KB