Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 01:42

General

  • Target

    770bd2b52da41659366ab5e9511b48e0N.exe

  • Size

    208KB

  • MD5

    770bd2b52da41659366ab5e9511b48e0

  • SHA1

    b137e24b2c60600df6646d62beb5a630e47877fe

  • SHA256

    d41fa3f65ecbf634812ffe9cb29bf546ff50d1456b0e89380d4f575a30329b97

  • SHA512

    d09a07343b42c06523db70524740e0ae32847143e01229564893c43a9e731ce9006e3421873031e882832c625933fba86da670b8a9b0b86a70c1866e2620122e

  • SSDEEP

    3072:tFqNLS84DiRZ594WGpPqgCjP1u4eJNLGJLWnulSGi4NLthEjQT6:7KLyDYd4WGxqph01GJ8m+QEj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\770bd2b52da41659366ab5e9511b48e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\770bd2b52da41659366ab5e9511b48e0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\windows\system\UJS.exe.bat" "
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\windows\system\UJS.exe
        C:\windows\system\UJS.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\UJS.exe.bat

    Filesize

    66B

    MD5

    a8ff3a704cb3d8fecc2245fca991b25b

    SHA1

    c9cf64dc55406d5308b776464de7c797481666f3

    SHA256

    f5c772e9d0852b71f1d894633676f6bda6b8130c5d7c3c9e6865b993dba7df28

    SHA512

    82584e3913e28e0f0562b4763081e4192f95915ba38760724fa1cb197c538c247ba60a755d7a2fbed100daa4f2d9b423d3bb38196a0404da0bdf0ee7540acf84

  • C:\windows\system\UJS.exe

    Filesize

    208KB

    MD5

    665c95df367f098397abc7a766259d79

    SHA1

    ac5c727aba89ab401a60b9fe85808fad339e685d

    SHA256

    86d0894b8720c12a02cfff202a80fe71c7c8dd06930efcb283c3d5be900395e5

    SHA512

    fd6f18b3555d2a91500b0a4b0d3d85bf889f5bbf42e320d500411184bfe6d1f303ddaa8e9ba1d814594dbb8f95b4fda20491d1e6da1f909c12a600513f40cbf1

  • memory/2180-0-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2180-12-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2968-20-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2968-21-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2984-18-0x0000000000170000-0x00000000001A8000-memory.dmp

    Filesize

    224KB

  • memory/2984-17-0x0000000000170000-0x00000000001A8000-memory.dmp

    Filesize

    224KB