Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 11:43

General

  • Target

    a6a848977bba93c6be2d3ce269976970N.exe

  • Size

    2.3MB

  • MD5

    a6a848977bba93c6be2d3ce269976970

  • SHA1

    6717b4aadf1afcb69d8f02d63c86993f056b4c49

  • SHA256

    ed53b0add7f2cc7082fabba059ea37b09967a186aa84dbed613b13bf18582622

  • SHA512

    b10bd84447a542e89e4505abad4d536c99eac8b6aae030ac9b37d6d99829ffbec1dd63ba5e27736feb158ae82db8665c6a2de56f76e60edd836c705bc66048ae

  • SSDEEP

    49152:sjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:srkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6a848977bba93c6be2d3ce269976970N.exe
    "C:\Users\Admin\AppData\Local\Temp\a6a848977bba93c6be2d3ce269976970N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    844760c7081e3719a27d68c16c24723e

    SHA1

    822a9b518ffe983e190860ca07fb1dc7a8ace72a

    SHA256

    3443c0d169be7789fd23037ef193d4f45f89d8e0ba1fbfeba12f09703e85c67d

    SHA512

    c55418a98993b6c1fe990d7e09f5de474a9c60b67f1c68bb03f7dfe7a0e2a44210dd4439c4135282c49cc9688d4fa9f3435732f5ddd8423e7131b4e1723f921a

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    2.3MB

    MD5

    81eafb291971c0034694d563c5f76cc9

    SHA1

    3aad77809149141d71497a968678f1c7bdcd072c

    SHA256

    734510750d3f1861f35675d64d091dda876638a9d2e678e81d9a7cfe1131d065

    SHA512

    09ed2c4bb4251c23b97d1ad76cc80d9010df200299b27c852ce46a4e3c8a8ab4383161673cf6284251703188bc1485b433894896e1ad3a98315449eef553ed95

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    255d1679fec89f141c461726e42680b4

    SHA1

    01b35d9ddc0572df93f9eb1e9e25fce8e7749de4

    SHA256

    73a0fefe1c422bfd459f3e14655321cd8405413a17072a8a9e15fe242b142c72

    SHA512

    649739f6250e34ec0bf105e55a2571bc00325d7a14baa15ec04db020f50e0e6f4933c76a7f456c9001cdca66fee41789cd31ea165b1c1fa40ee7bf873e642d38

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    5dc1bde9e00d10562493d1d4e42747b6

    SHA1

    e1582cc44599c72a0211a2ffbe9e66ce123de673

    SHA256

    2b18a6731f154e618ccce549e41b1725d6312889fa97a303db6c29b576a510ea

    SHA512

    9a09d605bb446d6352e91a89ef5e51005f5b080c81b1e64ace2017fa86d969bf72325f79d6b4c60450fce6163464a2199afc6fd69112e598d98e2201791b37ab

  • memory/2380-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2380-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2380-13-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2380-25-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2380-26-0x0000000000170000-0x0000000000179000-memory.dmp

    Filesize

    36KB

  • memory/2380-31-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2380-30-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2380-24-0x0000000000170000-0x0000000000179000-memory.dmp

    Filesize

    36KB

  • memory/2748-39-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-59-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-69-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-41-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2748-46-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2748-67-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-48-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-50-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2748-49-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-51-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-53-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-55-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-57-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-65-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-61-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2748-63-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2780-36-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2780-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2780-37-0x0000000000720000-0x00000000010EE000-memory.dmp

    Filesize

    9.8MB