Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 01:02

General

  • Target

    01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe

  • Size

    5.7MB

  • MD5

    fbc16cedeb1c77234171be5290ed06b0

  • SHA1

    51ca56aa40e042439d121c932cbb2ab20eeeeac2

  • SHA256

    01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0

  • SHA512

    44639242315d5b242bfe23ced27efca7d1439a6d011d0ddac55f7e10d949c3595447d51146477acd82d459c2694ac73d728206f0d734a95e553911754dab05f5

  • SSDEEP

    98304:IdkyIAYt3VXweTkquPhO881Vv2LDdLAGa8okC0HvIz1inN1aK+fno1TGDjZ:skVLXwcucUAG+Dz1iNQKio1El

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Modifies registry class 29 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe
    "C:\Users\Admin\AppData\Local\Temp\01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe C:\Users\Admin\3389\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:428
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 924
      2⤵
      • Program crash
      PID:2068
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\3389\BNZY1O1PB.exe
      "C:\Users\Admin\3389\BNZY1O1PB.exe" /f at.dll
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1256
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 1504 -ip 1504
      1⤵
        PID:1244
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}
        1⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Users\Admin\3389\3dsystem.exe
          "C:\Users\Admin\3389\3dsystem.exe" /f at.dll
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4976
        • C:\Program Files\Thunder\DirectX.exe
          "C:\Program Files\Thunder\DirectX.exe" /f at.dll
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2184
      • C:\Program Files\Thunder\DirectX.exe
        "C:\Program Files\Thunder\DirectX.exe" /f at.dll
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3572
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          /f at.dll
          2⤵
          • System Location Discovery: System Language Discovery
          PID:4100
          • C:\Windows\SysWOW64\winver.exe
            /f at.dll
            3⤵
            • Server Software Component: Terminal Services DLL
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2480

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\3389\BNZY1O1PB.exe

        Filesize

        570KB

        MD5

        ba7ba700c39c576330f18819e075d6be

        SHA1

        d7d3022c6c9bb979663c2b392c38d1e40fe5f163

        SHA256

        13675a7bc3274837f9e53c192646180b98b57ac9cdc675fc67c2cf2bf14df053

        SHA512

        60e225b9ce516e1f6e7aa95e2fe9e3f662b6c433cc34ad87054b2972fe840b2ad1c07494a42c5962a5a6ca01f2c2555c27c08fb79e0762790944e98bb621163c

      • C:\Users\Admin\3389\`BNZY1O1PB.lnk

        Filesize

        1KB

        MD5

        dfaf5dea53608cdd3112cddcb31e7a78

        SHA1

        65ae9f1a35b79048830a7403f261b616d5cc027b

        SHA256

        f88d8215fdfc49e47c2d4d3bb32722f13370246a683dd47cd6f1a464d82444f2

        SHA512

        fc9e0e9164035ee2a9d02fcc1fca7ddf816091dd487dfd70a6597dfd2a77a324d52e72d85d8ee56fa403673abb4b5563408e24cdec4ef57dcebbd088123fe4f9

      • C:\Users\Admin\3389\`BNZY1O1PB.lnk

        Filesize

        1KB

        MD5

        7baf62423146bc11132fbfc178835889

        SHA1

        7beada9e72cea47d134a7f7e649a204fe861771a

        SHA256

        e6f4c233dc0d83e1ce2c4e133076d94c8b771840ff1fbd450bd7fc888165d182

        SHA512

        f22783bd16de05563806662857cf6445d7c0092ca76d78cfe9782c9e3a0ff2ac8a0adb3a27eb20c209a2e997558525ee0444f70d8abdb9ea075095bb9c8d9997

      • C:\Users\Admin\3389\at.dll

        Filesize

        2.1MB

        MD5

        4d203806f4ae0355b490ba538794a686

        SHA1

        d6ae03ea49db471ad5adbf21c9744281e79ef6cc

        SHA256

        5daf973eb400fc29ae151aef633ded1097c9f30575db222879d903a9be5c1d61

        SHA512

        a2b869ad16f5b5d01dcf6eb6f70c4b46c6a80a2ec64c6068d0b08b64f77a636d9e5ed63df644130936ea334b3529c869149af9d25cc7140390797ad860934bd8

      • C:\Users\Admin\3389\libexpat.dll

        Filesize

        140KB

        MD5

        3c6d7543f7da78d10f33db5cecf99f63

        SHA1

        e9a69c18a91df5994f1dc90fc4d4d5458b322950

        SHA256

        21e45345242f87fb1889919ed47da370ffa72907126c5fe4c54b3476b8acac51

        SHA512

        77f44667525dae73fa06843d472264f416401e4069f6089cd53906cf44eb61f9a40e43b806ae3180743f2ed54e9e725df378ee9a67aea56aeefa9054df0c9833

      • C:\Users\Public\Redeqw.log

        Filesize

        1KB

        MD5

        bf269fb93f41b079404a3735c8000404

        SHA1

        49f1bbc8033cc610b3358446252cee795e5a60ab

        SHA256

        3f939c2bc51fedf2a612ba526cf516d1a5e293bdb8536801bd0cc9ada190546b

        SHA512

        3805c5800ae5f517d58d50343e257856218900a2d6a88ebd5cd6f6d212dee2f2e54ef5af4be0f7a9bbd856cfaa2c40d25e7eaee41da0639c5f61aced335078e7

      • C:\Users\Public\Redeqw.log

        Filesize

        2KB

        MD5

        7c95e3561524effb12aa5548b9d4e6dd

        SHA1

        d89371cc19bd86de82b74b15bfb3a92fe37f46be

        SHA256

        6958cb391f7cb56eda5e9a3d57b3a5b73855f76e46cf48769f7fc5aa97aa8044

        SHA512

        b939615e6de776a99de3eebca6d1cd8e036dd9b65cdff8f2344cfa6ba1764171b8a55b507081c3aa4e75d61f551e8c100a2a7e668dd02c237fa7e552c4273abf

      • C:\Users\Public\Redeqw.log

        Filesize

        3KB

        MD5

        d72f85d6fcc0d32703afcac068d36700

        SHA1

        a112c6079be56f6aaccd636f45285c1a424cdc4b

        SHA256

        8c2f15e217b56724344e670bb86dffe3f833c076091c543ef3f3da0c6b6c142d

        SHA512

        e744f286c715267984d54c15b46fa6003924d19ea9c7972413bad339f1668ec56b929c2e52cb10a8eca479948481fbf3244f7a071ea7e679d9b6c7efb496a306

      • C:\Users\Public\Redeqw.log

        Filesize

        846B

        MD5

        4bcdf29fa04168fff63f12e663ee22de

        SHA1

        b6b127853ae466f4aed6ebe66c2bfe1204475f8d

        SHA256

        304931702353d59825d38717ef2c916a52eee67252787f5357ee4b6d8e60aa57

        SHA512

        bbcad9c075801e4fabfe7d435043375a5929998d271712d93a05bb7e16bb6847b714424fcfa806f4a3ddaee96c376392a9c310d8a00dbf24e57a3cff74cff93d

      • C:\Users\Public\Redeqw.log

        Filesize

        1KB

        MD5

        ac2ecd9033325fc6d302fe6a69176f4f

        SHA1

        52e8cb82fd4ab9cacb3e038e2041959d1a60229b

        SHA256

        ce7e81bf9cf731da89a6e575ebc0a01d06a3e0da24c545cf72446d66d16bb7be

        SHA512

        59282387f11b4f558222b47c7aa6cbafd0acce4dc508174fdad2dbf95d1370fb8391bddb092125fbfc5b701327f8348f9ba3699175c448e63474431e2c5a1c34

      • memory/1256-14-0x00000000028E0000-0x0000000002B89000-memory.dmp

        Filesize

        2.7MB

      • memory/1256-68-0x00000000028E0000-0x0000000002B89000-memory.dmp

        Filesize

        2.7MB

      • memory/1504-0-0x00000000008C3000-0x00000000008C4000-memory.dmp

        Filesize

        4KB

      • memory/2184-94-0x00000000037B0000-0x0000000003A59000-memory.dmp

        Filesize

        2.7MB

      • memory/2184-118-0x00000000037B0000-0x0000000003A59000-memory.dmp

        Filesize

        2.7MB

      • memory/2480-119-0x0000000000800000-0x0000000000801000-memory.dmp

        Filesize

        4KB

      • memory/2480-122-0x0000000002910000-0x0000000002BB9000-memory.dmp

        Filesize

        2.7MB

      • memory/2480-127-0x0000000002910000-0x0000000002BB9000-memory.dmp

        Filesize

        2.7MB

      • memory/2480-132-0x0000000002910000-0x0000000002BB9000-memory.dmp

        Filesize

        2.7MB

      • memory/2480-134-0x0000000002910000-0x0000000002BB9000-memory.dmp

        Filesize

        2.7MB

      • memory/2480-133-0x0000000002910000-0x0000000002BB9000-memory.dmp

        Filesize

        2.7MB

      • memory/2480-136-0x0000000002910000-0x0000000002BB9000-memory.dmp

        Filesize

        2.7MB

      • memory/3572-106-0x0000000001B40000-0x0000000001DE9000-memory.dmp

        Filesize

        2.7MB

      • memory/3572-115-0x0000000001B40000-0x0000000001DE9000-memory.dmp

        Filesize

        2.7MB

      • memory/4976-88-0x0000000003710000-0x00000000039B9000-memory.dmp

        Filesize

        2.7MB

      • memory/4976-71-0x0000000003710000-0x00000000039B9000-memory.dmp

        Filesize

        2.7MB