Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 22:12

General

  • Target

    79773875e2393fe3f19da7d759a0f550N.exe

  • Size

    79KB

  • MD5

    79773875e2393fe3f19da7d759a0f550

  • SHA1

    07e6975e9cd85446065b602d3604cfe850e96f47

  • SHA256

    8564c900d5971b48f88a7c2c65fc194297ff076d706d29788f342ea1a5acf6d6

  • SHA512

    003b6384c66add9aaf284dffb8710d1414eb9596e65baf3da5e51b72940106aaaa36db3f7075b4da9d6d1191dd006a687061ff86467de75c6204bcb2628523c5

  • SSDEEP

    768:4vw9816vhKQLrod4/wQzXOQ69zbjlAAX5e9zz:wEGh0odlGizbR9Xwzz

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79773875e2393fe3f19da7d759a0f550N.exe
    "C:\Users\Admin\AppData\Local\Temp\79773875e2393fe3f19da7d759a0f550N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\{32035224-EA95-4248-9AB8-C25437525BE4}.exe
      C:\Windows\{32035224-EA95-4248-9AB8-C25437525BE4}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Windows\{D02697C7-4401-45c9-A0DF-173DCA860A26}.exe
        C:\Windows\{D02697C7-4401-45c9-A0DF-173DCA860A26}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\{E6405ADB-F3FB-4d11-BA01-8BB84D3FC960}.exe
          C:\Windows\{E6405ADB-F3FB-4d11-BA01-8BB84D3FC960}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3304
          • C:\Windows\{98EF2468-EB41-45eb-8A67-6D9239876F2E}.exe
            C:\Windows\{98EF2468-EB41-45eb-8A67-6D9239876F2E}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3728
            • C:\Windows\{A7058A74-A76F-48c7-9DC9-6B265E7E94B3}.exe
              C:\Windows\{A7058A74-A76F-48c7-9DC9-6B265E7E94B3}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4088
              • C:\Windows\{70443198-3E21-44e8-91F3-9829B45BFBFC}.exe
                C:\Windows\{70443198-3E21-44e8-91F3-9829B45BFBFC}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4436
                • C:\Windows\{D961B77C-0767-45ae-BBEF-8A753F77AB71}.exe
                  C:\Windows\{D961B77C-0767-45ae-BBEF-8A753F77AB71}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4848
                  • C:\Windows\{F188FBBB-99BE-4c4f-8312-DD0B481F3DEA}.exe
                    C:\Windows\{F188FBBB-99BE-4c4f-8312-DD0B481F3DEA}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3480
                    • C:\Windows\{4D2CA4F5-E1DC-445c-B520-50C9A66C2D27}.exe
                      C:\Windows\{4D2CA4F5-E1DC-445c-B520-50C9A66C2D27}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:5080
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{F188F~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:740
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{D961B~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:3424
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{70443~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2716
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{A7058~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4348
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{98EF2~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2360
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{E6405~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2544
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{D0269~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2564
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{32035~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1168
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\797738~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{32035224-EA95-4248-9AB8-C25437525BE4}.exe

    Filesize

    79KB

    MD5

    e92796c62ccff0b4641c51df24fdb9bf

    SHA1

    162cc58f7c70d9ccb02242f9c4289d6c3e85c727

    SHA256

    b798ae1af2a4d5fb6b3b9aded3df604a24a1acc57d32f00abc3da30019af254c

    SHA512

    9052ef9407a7f093034538d2c14bdc168b21058063d5b2f6301622137d37135313425784a4a52018938aaf987e75b4c6d49de1445bc23417024279864302e713

  • C:\Windows\{4D2CA4F5-E1DC-445c-B520-50C9A66C2D27}.exe

    Filesize

    79KB

    MD5

    2bc5c066cee60d4f819bcdbc48c0e275

    SHA1

    d7ee3226cad3192887dd89e6efd22245582bcfed

    SHA256

    ea827cdb84072d8e0fa6b9e304bf9c076e3f76d8672160c517dee627e7f4c710

    SHA512

    475f19e2b025d13f3558f26f939d9c47fdf2c96500ccbe5071d59d499519bdb9767402ecbc5b3968ed6db9402aa2b800cbc7102b5786c60b49537cf76156ae20

  • C:\Windows\{70443198-3E21-44e8-91F3-9829B45BFBFC}.exe

    Filesize

    79KB

    MD5

    49ec558d3c440ae1e2c9889456813d4c

    SHA1

    511c383af9cc6a2f6fa427ec2277b91ced43e731

    SHA256

    95d60544394a0fcd9811a33301f52bf479d846eca7d0144e200e7278c80aa8ef

    SHA512

    e12313ffde12e7d5d85eb48725b4257029cd65684ef6d78ab08b9d24200eb688067b6a44f9507274f61cf89ca18266bdab0b7f9b6f1bb47ee8584fb6cb47b92f

  • C:\Windows\{98EF2468-EB41-45eb-8A67-6D9239876F2E}.exe

    Filesize

    79KB

    MD5

    cd3a9432e077ad357c3c14a89c1b4ecd

    SHA1

    05f65d72496f30e9afd478bf9bcb82dc3b4ad7eb

    SHA256

    f6220cf4d810e63fd641fe6a071d5e6c221131f5bbfa7c8a1fc34089f3dd7fe0

    SHA512

    10af105f8e2b0cbdf0549690f80f4e4fa1781d76142e0b5b4b6f24d07a43b59ea1289c6f4f8636b391b9427f76cf69da741f3dfdc9e112e9c095239d72a43fa2

  • C:\Windows\{A7058A74-A76F-48c7-9DC9-6B265E7E94B3}.exe

    Filesize

    79KB

    MD5

    ef38fb5b3b4e3d3a41b5c217e2ad78d5

    SHA1

    e741259c52b60c56e3d3b3e903ed22d241dacd38

    SHA256

    f5b4a0cb3ad3557afac32fdc1f3f677096a615323de8ad5051bd51eed057edf6

    SHA512

    055b44fd7f8ad4e59a4a59355a3d003ff67a62c4ca543e5a4ce30727194b8be3214b4fb76bba70649f020aad674785447821e4e116fbba2c5822b0dfa75e31d2

  • C:\Windows\{D02697C7-4401-45c9-A0DF-173DCA860A26}.exe

    Filesize

    79KB

    MD5

    1fc19bfd9d37e8bb46e26768b0603808

    SHA1

    77c542fe8e112452733c8049a64d8615ff9cbe38

    SHA256

    24e00801d2c134d83f16f2084266d2df247877f42d57dc678fe7a13cf89e18e8

    SHA512

    16d911594e00fbdcf09e7e7eb8e4f00249c52912301e6e1224a2a90357b8ee022d91c7fa88f7c4b5a3199896fe5239387de63038772a0e8d11ca0b7f93f4849d

  • C:\Windows\{D961B77C-0767-45ae-BBEF-8A753F77AB71}.exe

    Filesize

    79KB

    MD5

    1a072d06b9f6ba134e9f7b981a300680

    SHA1

    8bb20711979f6d899b583e68f4d481e1e7c2b2aa

    SHA256

    257206135d00fdb47ad9a6e83582bf0a8fedcfe906d614ec4aa0fcece44cf9f7

    SHA512

    6877bef179b3b88026c5986c1b998ea0ee099ebb5e5353bfb44f3cf1ff17c581e581534cba6d9b7264ea875fec58efc358417dea5187113144bb64657251e596

  • C:\Windows\{E6405ADB-F3FB-4d11-BA01-8BB84D3FC960}.exe

    Filesize

    79KB

    MD5

    fa61c4564933748a28496ea1de20f091

    SHA1

    158436cdef7cc2d83bc48cfebdbd542970c19df9

    SHA256

    71da9d867f32709bad683c152660a6c7127e3e3b132effaa8cd2c2f1c88bcb02

    SHA512

    106695421dc1ff71a40cdd996ab7619280a254afa58b8af0da3416271ffa9dc04b0151d91154f38748e3b40fa06ebc8c9d589e91e2fa4ee29a1299127a3824b5

  • C:\Windows\{F188FBBB-99BE-4c4f-8312-DD0B481F3DEA}.exe

    Filesize

    79KB

    MD5

    7635afcfd6f153fbf2be86bc609b7748

    SHA1

    b157383a24278c3a8ae046b8bd0a40c2844cd389

    SHA256

    81b0b02e5b757ac2a1fc09ee66210a790ab798b2f556504aa9822a113288c27f

    SHA512

    90e641f9f730b9123bcfec83a235d555ac0952273b74a06263f3dc9d62ea3b142e161e4fc6b993405c476692263c0396e5909d44db275795380bd295e863dffa