Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    103s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 01:47

General

  • Target

    $TEMP/4204_adknowledgept.exe

  • Size

    1.1MB

  • MD5

    365a16d067623e31b20bed5165649473

  • SHA1

    3034fa4971efed7e56df54df482b70e7b555537c

  • SHA256

    e222a717b3c76ec83f55f88d1113f4abc6be660e809db00889d2aff404798eef

  • SHA512

    412137ca836d52ef53b7e1facd982c86f3d407ed3035c96045df99788c46a170dafe5f5b54dc3ed2751137a12451ee55d72f4ec972096c29bdae06bf2789c5f9

  • SSDEEP

    24576:pmJRe0AcpdtXLeMBYKwHcX4TuBIgSpOJB9nRpzqppn:pF0AOj6OX4T2IzpOJjXkp

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\4204_adknowledgept.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\4204_adknowledgept.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso4156.tmp\eula.html

    Filesize

    14KB

    MD5

    da5f15770b833d2e7876db980d472b17

    SHA1

    63cf6cd7fa903646c0e86b1713a362f25b20d478

    SHA256

    248bde8035036d6f0c3e5afc5eb247f64801111487916750bdb8e77fe287344f

    SHA512

    d699d74ee4cf9f0a1d2e61a1d504a3604018c3c8406b513ba0e3b1d3d0e9c0095e74d0be7966c085d27cd0c118054baaf20fba591519e55c73608dae10c3d2b4

  • C:\Users\Admin\AppData\Local\Temp\nso4156.tmp\eula.ini

    Filesize

    756B

    MD5

    12f31f5b7557c08ce3c811086c6fa7f0

    SHA1

    0de6a576413b45b10bf36a436d5fdde7fc7be148

    SHA256

    d633fb0069075e16d1f5216fba8e32a82e11e6bbad862ff4e0e4156fdc802fef

    SHA512

    edfccfba30fc7f196d5c068f88dc0d379c4a0d3929760bb1f5b9c39dc20cf6de6683b3240cc0da8821fb81bf36507d8ce9146f0c1047db37893d2ff46dfcbdbf

  • C:\Users\Admin\AppData\Local\Temp\nso4156.tmp\eula.ini

    Filesize

    704B

    MD5

    d7be577efc9ac7d108d7ec8af3180bf7

    SHA1

    75716f2450f47e8dd8973dc58336d8c9b25fd3c4

    SHA256

    bda528f57e5d2f86762c5e3d74befa0f42e5408a704833d486cb0b86a8b845f1

    SHA512

    4d07e28f0371fef9c4790d3efeb428b35e3f73377a3fb359127d1b360d4411f2b870a93dcfa50376435297f9ee2f802110fe5cddbe012c560521fd9f22cc4e6a

  • \Users\Admin\AppData\Local\Temp\nso4156.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    6e663f1a0de94bc05d64d020da5d6f36

    SHA1

    c5abb0033776d6ab1f07e5b3568f7d64f90e5b04

    SHA256

    458b70e1745dc6e768d2338ccf3e6e86436488954ca3763472d8ffec4e7177e4

    SHA512

    2a037c39f3a08d4a80494227990f36c4fef2f73c4a6ad74dcc334317a1372234c25d08d8b80d79e126881a49fa4b3f2fffe3604c959d9ceceb47acc7192cc6a5

  • \Users\Admin\AppData\Local\Temp\nso4156.tmp\System.dll

    Filesize

    11KB

    MD5

    b9f430f71c7144d8ff4ab94be2785aa6

    SHA1

    c5c1e153caff7ad1d221a9acc8bbb831f05ccb05

    SHA256

    b496e81a74ce871236abcd096fb9a6b210b456bebaa7464fa844b3241e51a655

    SHA512

    c7ce431b6a1493fd7d1fe1b1c823ad22b582c43c8eb2fb6a471c648dd9df9953277c89932c66afd598d43ea36f4a8602e84cd175115266943071cbc8ce204099

  • \Users\Admin\AppData\Local\Temp\nso4156.tmp\installhelper.dll

    Filesize

    254KB

    MD5

    4cf4f52c1bec27e7b0f98acb291ab8e9

    SHA1

    73b9e7e43bd79212af54c9ade8e8a813c40e6bf9

    SHA256

    1df98f32dcea672ee2287c6b5cf5810ede6a90b1e3c9348ee36198a062711d9b

    SHA512

    daee3a6afca82a6029e9e540e6ded992b0a1ca2903c84d1991768d447abce9c74adcb4df2f76c5d586ccc9d489a359352d362717164784dc8ba9b6b2e4e14f9c

  • memory/3064-121-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/3064-147-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB