Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    100s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/09/2024, 05:45

General

  • Target

    dropper.exe

  • Size

    33.5MB

  • MD5

    5e84cd460ac5eb9ee72dd2f831297b52

  • SHA1

    17960e740ac5596b5025ab0515383df0db3b8753

  • SHA256

    8c473bf936fd8076a2330dbc420ed96b96a6169f747aab0129705e1d4e57309d

  • SHA512

    c670120cea8eef9ff2f017e1d13470774a155cbc5e47877adf45ed37a91afa89eee6903fd7b848d99a5cd0aed4c5619541928ea0ed63caeb866c0a68ca1a14de

  • SSDEEP

    786432:lkghL+KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/b:agB7Db25qz0dQAUgGXIPwbZnb

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dropper.exe
    "C:\Users\Admin\AppData\Local\Temp\dropper.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" diskdrive get Model
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3520
    • C:\Windows\SYSTEM32\findstr.exe
      "findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
      2⤵
        PID:3384
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C "C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat"
        2⤵
          PID:1880
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:580
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1872
          • C:\Users\Admin\AppData\Local\Temp\dropper.exe
            dropper.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:440
            • C:\Windows\System32\Wbem\wmic.exe
              "wmic.exe" diskdrive get Model
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2616
            • C:\Windows\SYSTEM32\findstr.exe
              "findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
              3⤵
                PID:1192

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat

            Filesize

            20B

            MD5

            3f3a41bd8b90767fc6aac3793137c6f3

            SHA1

            8709a86ed2364a4daf7c443770b1f3fefc6d7529

            SHA256

            41b9efbeb8fe9a6f96a7ad64edbf1d06a24d5d4574d380191411af3d64614c80

            SHA512

            7555b2ec9e6b0a2c1eaaff954b0a7d5421f1b5b79b38261d5d5c1d5b41699047a2db2593b679ac454cd5e083508961d5689f5880136faf2470e9219463c37dc8

          • memory/3332-32-0x000001D012000000-0x000001D012040000-memory.dmp

            Filesize

            256KB

          • memory/3332-44-0x000001D015650000-0x000001D015850000-memory.dmp

            Filesize

            2.0MB

          • memory/3332-16-0x000001D011160000-0x000001D011190000-memory.dmp

            Filesize

            192KB

          • memory/3332-12-0x0000018F7C0F0000-0x0000018F7C110000-memory.dmp

            Filesize

            128KB

          • memory/3332-8-0x0000018F7C180000-0x0000018F7C1D0000-memory.dmp

            Filesize

            320KB

          • memory/3332-4-0x0000018F7A800000-0x0000018F7A830000-memory.dmp

            Filesize

            192KB

          • memory/3332-20-0x000001D011110000-0x000001D011130000-memory.dmp

            Filesize

            128KB

          • memory/3332-29-0x000001D013480000-0x000001D013630000-memory.dmp

            Filesize

            1.7MB

          • memory/3332-48-0x000001D012040000-0x000001D012080000-memory.dmp

            Filesize

            256KB

          • memory/3332-1-0x000001D012100000-0x000001D012D90000-memory.dmp

            Filesize

            12.6MB

          • memory/3332-40-0x000001D0152C0000-0x000001D015370000-memory.dmp

            Filesize

            704KB

          • memory/3332-36-0x000001D015140000-0x000001D0151B0000-memory.dmp

            Filesize

            448KB

          • memory/3332-56-0x000001D0158A0000-0x000001D0158F0000-memory.dmp

            Filesize

            320KB

          • memory/3332-52-0x000001D0153E0000-0x000001D015420000-memory.dmp

            Filesize

            256KB

          • memory/3332-60-0x000001D0159D0000-0x000001D015A60000-memory.dmp

            Filesize

            576KB

          • memory/3332-24-0x000001D0111B0000-0x000001D0111D0000-memory.dmp

            Filesize

            128KB