Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 07:13

General

  • Target

    13da81b28b308884975e323f46a41b217a205aadf0f4297b9455520fe232f8ff.exe

  • Size

    5.0MB

  • MD5

    167ab93337fab4f0b33d3d851be4174c

  • SHA1

    0c4030e902d7f6595fdfbbf7aa5b9d3d087f3e43

  • SHA256

    13da81b28b308884975e323f46a41b217a205aadf0f4297b9455520fe232f8ff

  • SHA512

    0a9fd0fed9931328be4aa87d870e3ebd1b30681dd4256f78dc0f9d7de803463b09904eb62c9c87cb54263f4e2dc0928467c38d0f0ecd05193ca9d6e218d9a600

  • SSDEEP

    98304:M1vGs4i8eh6ruA9S6lp2kysNzX4nAyyWWaao03ZaGCrhUNO9vWHyLInPPp5Scl:M6imruA9S6GJUXW5azAWwLLInJoe

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13da81b28b308884975e323f46a41b217a205aadf0f4297b9455520fe232f8ff.exe
    "C:\Users\Admin\AppData\Local\Temp\13da81b28b308884975e323f46a41b217a205aadf0f4297b9455520fe232f8ff.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 928
      2⤵
      • Program crash
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RegDm.dll

    Filesize

    52KB

    MD5

    fdc8b75a37017141831e3421479307be

    SHA1

    f6a08cc570d5e5bc4218da376ca353d46d62790d

    SHA256

    2a37ce301490bd4b7c5d02b768b054705fe4620db6ef81061718c1fe89c9f27e

    SHA512

    d74e2de28523317c928965affa464cef6ba5c4da9ab05d30a79a4d3bbb59284d68331b5735c705cf73e155cf3a42b01ef5cd7219c72c242eed6b711090066537

  • \Users\Admin\AppData\Local\Temp\dm.dll

    Filesize

    3.4MB

    MD5

    af63816b13d8ee8f9abf27b1c4078fe0

    SHA1

    b939631d51fea14612fd69e0e450b69a9f57f879

    SHA256

    bed18ff4eca4cf4b6ac671dc8d5f027878c8a6cf6ec4d72eca0fc0f7f37e1852

    SHA512

    f4abc2fd960a0890e0083ab07ceb010ac6db64dea45a403b721d93f411845e37d0e4a65127aa551d4ff35ad3fcaca80f72f5b87079e0612b31ea4ef27152d7a4

  • memory/2140-26-0x0000000000FB0000-0x00000000010B1000-memory.dmp

    Filesize

    1.0MB

  • memory/2140-6-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-19-0x00000000009C0000-0x00000000009FC000-memory.dmp

    Filesize

    240KB

  • memory/2140-18-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-17-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-16-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-15-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-14-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-13-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-12-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-11-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-10-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-9-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-8-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-7-0x00000000777BF000-0x00000000777C0000-memory.dmp

    Filesize

    4KB

  • memory/2140-27-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2140-5-0x000000006FFF0000-0x0000000070000000-memory.dmp

    Filesize

    64KB

  • memory/2140-31-0x00000000049B0000-0x0000000004E90000-memory.dmp

    Filesize

    4.9MB

  • memory/2140-28-0x00000000009C0000-0x00000000009FC000-memory.dmp

    Filesize

    240KB

  • memory/2140-32-0x0000000004E90000-0x00000000056AB000-memory.dmp

    Filesize

    8.1MB

  • memory/2140-33-0x00000000056B0000-0x0000000005FAA000-memory.dmp

    Filesize

    9.0MB

  • memory/2140-35-0x0000000000B80000-0x0000000000B96000-memory.dmp

    Filesize

    88KB

  • memory/2140-34-0x0000000000590000-0x0000000000592000-memory.dmp

    Filesize

    8KB

  • memory/2140-37-0x0000000001170000-0x0000000001171000-memory.dmp

    Filesize

    4KB

  • memory/2140-40-0x0000000000D40000-0x0000000000D41000-memory.dmp

    Filesize

    4KB

  • memory/2140-39-0x0000000002B30000-0x0000000002B3A000-memory.dmp

    Filesize

    40KB

  • memory/2140-38-0x0000000002B30000-0x0000000002B3A000-memory.dmp

    Filesize

    40KB

  • memory/2140-41-0x00000000049B0000-0x0000000004E90000-memory.dmp

    Filesize

    4.9MB

  • memory/2140-42-0x0000000004E90000-0x00000000056AB000-memory.dmp

    Filesize

    8.1MB

  • memory/2140-43-0x00000000056B0000-0x0000000005FAA000-memory.dmp

    Filesize

    9.0MB

  • memory/2140-45-0x0000000000B80000-0x0000000000B96000-memory.dmp

    Filesize

    88KB

  • memory/2140-46-0x0000000002B30000-0x0000000002B3A000-memory.dmp

    Filesize

    40KB

  • memory/2140-47-0x0000000002B30000-0x0000000002B3A000-memory.dmp

    Filesize

    40KB