Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 00:16

General

  • Target

    060035baaa53420a9ca90516c83d2050N.exe

  • Size

    346KB

  • MD5

    060035baaa53420a9ca90516c83d2050

  • SHA1

    645a55ae3c43059f1ec482f1acd1f284d4e93eae

  • SHA256

    08fda62494050ac591a90803b82d7d4175434c51f70fceae922bf567d279967d

  • SHA512

    08406d8c825c3c070e68f3089b28b10aba49f0c0d4a461f04823cbfcaabc219ad85fc68ba442d15e348396d099a964b9a6a174e0c11f5acf98c6bd7cc05112f2

  • SSDEEP

    6144:EXc2uDUB2B7WdDMtE7iiyqW5gEjm8PtEC1YcTzT4Cl45lxj6LjJoxGq6IE9k9:EXcpDUoEdp7iiyqW5hK8FEszTr6lxOFg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\060035baaa53420a9ca90516c83d2050N.exe
    "C:\Users\Admin\AppData\Local\Temp\060035baaa53420a9ca90516c83d2050N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\RemoteOperator\1.0.0.0\2015.09.06T01.24\Virtual\STUBEXE\@APPDATALOCAL@\Temp\RemoteOperator.exe
      "C:\Users\Admin\AppData\Local\Temp\RemoteOperator.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\RemoteOperator\1.0.0.0\2015.09.06T01.24\Native\STUBEXE\@SYSTEM@\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 620
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\RemoteOperator\1.0.0.0\2015.09.06T01.24\Native\STUBEXE\@SYSTEM@\WerFault.exe

    Filesize

    17KB

    MD5

    36e3fa60e628d7cbd22bc1dc8ccd6a11

    SHA1

    7ae9f7da10ee11131aa0f48c8be00ad0a59bce11

    SHA256

    af12be88da7a4dff7849f9af96130976e137d2c854e699bedccb778dc0842e83

    SHA512

    0ab35aedae2c77e64f89be4280296cdbda268f91e78d8cdfd07f417f133d4f8fc003f2f40eea3f4b3bf7c78d56bc14c31d0c45616201e25070d53d04f86c4346

  • \Users\Admin\AppData\Local\Xenocode\Sandbox\RemoteOperator\1.0.0.0\2015.09.06T01.24\Virtual\STUBEXE\@APPDATALOCAL@\Temp\RemoteOperator.exe

    Filesize

    17KB

    MD5

    2dc5901d28a2a5a07fd1bad6223495a9

    SHA1

    98d5bee6291c558e54b976f08dbdb42dd41958ea

    SHA256

    d6078adca4893bf57edf3a96e5eb0e450c9b4897f84bdb953e0bbd28e4e2ed91

    SHA512

    aab782b3149ca80b2fb4dabb533b7d1d2307838029e3ca043fc56054c57b48cdc07e554aa5aa9b31b8dbdde3dbc4b654a77c828cc5d7a7d287cbad87a4dae3c9

  • memory/2280-630-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2388-39-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-37-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-35-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-33-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-30-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-27-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-25-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-21-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-19-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-17-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-15-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-13-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-11-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-9-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-7-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-5-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-3-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-1-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-0-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-68-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-122-0x0000000076EE0000-0x0000000076EE1000-memory.dmp

    Filesize

    4KB

  • memory/2388-161-0x0000000076EE0000-0x0000000076EE1000-memory.dmp

    Filesize

    4KB

  • memory/2388-190-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-42-0x0000000076EE0000-0x0000000076EE1000-memory.dmp

    Filesize

    4KB

  • memory/2388-41-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-291-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-302-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-323-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-321-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-276-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-257-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-241-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-220-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-204-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-202-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-201-0x0000000076EE0000-0x0000000076EE1000-memory.dmp

    Filesize

    4KB

  • memory/2388-200-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-176-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-158-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-142-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-126-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-119-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-104-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-91-0x0000000076EE0000-0x0000000076EE1000-memory.dmp

    Filesize

    4KB

  • memory/2388-88-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-74-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-66-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-62-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-60-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-58-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-56-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-54-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-52-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-50-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-48-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-46-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-44-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-320-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB

  • memory/2388-937-0x00000000004D0000-0x000000000053C000-memory.dmp

    Filesize

    432KB