Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 23:34

General

  • Target

    5822bad2c7af0ed5cbcb913fbb590ab09156d4a70bef5e53e98270b02f5dd28aN.exe

  • Size

    3.3MB

  • MD5

    4f466872751acb3af771b6dba52009b0

  • SHA1

    9498ccb89b2266a383d19cf50df146d12dd8a437

  • SHA256

    5822bad2c7af0ed5cbcb913fbb590ab09156d4a70bef5e53e98270b02f5dd28a

  • SHA512

    1ca9a8418a708a4f94b6553dcd7574e368a6281f86136f2091707c5ba009466e322db7785d172d3286a4641d88454140830a1f1cc8dc466c3d4ac06dc127200c

  • SSDEEP

    49152:mD/2YbJs2RXoxqzjOS5pFy14gtHGZD3/E4in2Pwk1I0ndLRHpEfK/lzZNTha/:0/1iQXoxe/5pu4d3VtdLRJuMTK

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 30 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5822bad2c7af0ed5cbcb913fbb590ab09156d4a70bef5e53e98270b02f5dd28aN.exe
    "C:\Users\Admin\AppData\Local\Temp\5822bad2c7af0ed5cbcb913fbb590ab09156d4a70bef5e53e98270b02f5dd28aN.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\program files (x86)\internet explorer\wmpscfgs.exe
      "C:\program files (x86)\internet explorer\wmpscfgs.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2620
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2852
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2832
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:632
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    3.3MB

    MD5

    c36dd21c06190ea3fd5b9b3840ccd7c6

    SHA1

    da06ffb7269488371bba5f1c86890d16214994af

    SHA256

    22f46c639ed56aabd26f02b39dbb2263b3c1a99e985da683530546750261ac74

    SHA512

    3e4eaac74e8c9656305cf6d59fd4d67be20917643d2a4ac680b6273afe97480b8965b85d685a333d4a8716e744ef04009b71643328ea6c95c3b0bd9010f9b5ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c8d00efa75e390576de20483e68c6a3

    SHA1

    426116a48e991a04296ecaa996898d71926bb280

    SHA256

    e7ab7669defed976602792c29e29d81e362f864349028eee3a9c59e57e9d9415

    SHA512

    6464fa5f8dd5255c14512c147722ad50b3bc5cb8ca29e3579ce4f112e98de997eb8a83fa5fb1489c73d7f746709a382bbad155b388cd13bb68945907bfd97037

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2d3a0830a30ded7de130bd17510563f

    SHA1

    934b2e6efc05a5958686dcf2ac7d02cdbb923dd5

    SHA256

    ecc5ea8882fad6233f2b6b990ddd48ae443beaf3986083d4f6d3499bd2dc217d

    SHA512

    31e855efc933690ad165ca79e9780e3107968ee9feb71690327f0eba1724376bf809d308fa91c5723ca4848b9e534c0e2fc09a7fe7f3896891677ed5d854383e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9003cef68b863e9cd808eda5a83f87d5

    SHA1

    e2924fef6722416b56b1bedc5922648464c36a47

    SHA256

    23b4a5a8933e01ba86518425a5699b47aae6cf1829e7e6efbec4b3a0de4d4fd8

    SHA512

    9741a9fba35850cde1de767430f3d14618d55824573bb74d2a7df074501eead3f0fadc1976136f65f6ec806cd330cf26f20ad592414733abf50a22696e5a403b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d3fa1c8ce2ef9f3197f7806e51e16a6

    SHA1

    fd1f0270cde1537830caf40662daa6191c72c14f

    SHA256

    c47fa78a5883709e764fbfcafd2e9b165ee62865f1c29b9072dfa411b3a92a73

    SHA512

    7247a5f4456a2a2308b4e2a3dbfc8e63e411400768443d2f91c41f713ff38ded4ad456d7d502845ebe2ceacd94950617b8051cdee7e37d5cb05f8e6d773bbacb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97bf429b16e7ab45d0ba1ebf53bbbbae

    SHA1

    5d9f1a148e0ef37efe0ca8cfdada9f85577ab6e1

    SHA256

    94be793b31000a8be76975d5fe60fdfe24585c632463372492841d5f9a0562b6

    SHA512

    537ff5ac8269ffc6deabe9689040c86b15ddeb9c7a36899d4fdb76aa223ad6511fa7c2494daab5c0103d72a9dbf35542301bc860e1a8d0f73778bfdd7ecea676

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7af2e24a4e0d4828d7abbce6db0f518a

    SHA1

    1085c14cd97b8979839d624369ce55f2d7103108

    SHA256

    fdbae3387ad3d85ce40a2f4e903ac1ac91c5846ff2cbe401e273b303b0916293

    SHA512

    df381a85c211264729538ba28ddc23db0605ec5a0d07226ae64cbd7dc383f30b7ac633519911be7a84155a6c688d423d64a537320a42f5554c7bc76d09aa237a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a99839a98f9b59a1ba39e7d12dd6ba03

    SHA1

    f486c554530c6f86cef1f1d223a566feaa1b836c

    SHA256

    447d5ed1f0254b96707d930243bfb023e9878c12b55ad77df4541279e52e5763

    SHA512

    f27e9613162963c7047b601e0ad4696fe9e034962fcbfeec756330359248f33a8755c561d50e88f4358e6e7df6859c01a2f6235374fefebd93ef2cca2d581bce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4f21d08baefc2f1e62abf18501299ee

    SHA1

    0683dfd10c31307c247c2b30605043f39c12755b

    SHA256

    a6ac450e404d81e634614d5151410c7449577d0c4f4f61d95b4a9c7f26fe5c1c

    SHA512

    3f1a018b27d9fc3d68079a55611f21523e69521280d31c3777de3d041b3d600ebd0f65d90977e621f427454238ce497c998dce06c52b6d7f4b78c31e32918e28

  • C:\Users\Admin\AppData\Local\Temp\Cab5320.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5333.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    3.3MB

    MD5

    b96cde0f61c845a3fdfe136115ab91f0

    SHA1

    6e666e083c5e33998b1a9bebbd53d1d9961e564c

    SHA256

    9abce63d514c611ecf3e2542ce4ba72d4a4af7342706cf499ca5620df123583e

    SHA512

    f91b733793c48efade07a86909d7bb1526bcfd96367d20f5e2a3716cd7146e17154b08a352849a5e77421fc454bdfff0657bce04a1f081d9d7388201ee8ffec1

  • memory/632-114-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-57-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-42-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-549-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-547-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-45-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-63-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-61-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-53-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-59-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-55-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/632-41-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2132-23-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2132-26-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2132-0-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2132-24-0x0000000005440000-0x0000000005E14000-memory.dmp

    Filesize

    9.8MB

  • memory/2132-2-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2132-37-0x0000000005440000-0x0000000005E14000-memory.dmp

    Filesize

    9.8MB

  • memory/2132-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2428-56-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-60-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-44-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-548-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-546-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-84-0x0000000002C40000-0x0000000002C42000-memory.dmp

    Filesize

    8KB

  • memory/2428-113-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-40-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-38-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-62-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-31-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2428-39-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2428-58-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-27-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-28-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2428-54-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2428-52-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2620-51-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2620-46-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2832-83-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2852-82-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB

  • memory/2852-74-0x0000000000400000-0x0000000000DD4000-memory.dmp

    Filesize

    9.8MB