Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    54s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 15:27

Errors

Reason
Machine shutdown

General

  • Target

    TheAltening.exe

  • Size

    120.8MB

  • MD5

    29689fef5edf0357ca6a07dffc7a71ea

  • SHA1

    8855b2d203833744323bd7b0cc7a8894998607d7

  • SHA256

    31c4ab99ebb574c221aa795161b959fed11a0e6908bf64385944873f293c5253

  • SHA512

    6c90ab9c0aecaffd966a722f290e5c9cc83b51b3da54bc247275debeecc8d8a028b2f9e4bcd182b832e1af1057de5c0d38b815f23e1a6716e76025d0a371bdd0

  • SSDEEP

    786432:uQ/HMKcIK3l8vVwEgNRajudstuB+chCkZ9xKX65/wfejMVJu:T/vvKepgmq2tuB+chCE9EQ1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\TheAltening.exe
    "C:\Users\Admin\AppData\Local\Temp\TheAltening.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3652
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39ac055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\D3DCompiler_47_cor3.dll

    Filesize

    4.7MB

    MD5

    c4974c924b605bd322c4872d72de90d1

    SHA1

    20df9433eab24d3291696046646f493794b77cba

    SHA256

    71d766b4742ca9f7422bb2efc3dc03f2cee509a5a43d241e748cda7aaac24bf4

    SHA512

    3889648dbb4608ece9c68f1cd5b1601da5b795eade7910764dd4769090cdb209a39acf3986e6e7190745f3bc6b1477a52dfaccb96a7e799eafc0825e2c44a846

  • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\PresentationNative_cor3.dll

    Filesize

    1.2MB

    MD5

    8e874bb782193fa45d027254e7d03244

    SHA1

    024ccc78d1d23050164e8cfdf141c921f42e0c74

    SHA256

    f75f98fbbb02dad69bcd8c69ec26eb3705dbd95dad996b58308b50e6c9904246

    SHA512

    3f3b0f93e5600c0671688317ee00d7a88411b80b7c4aa383d274af318782a66665409a528d484409bfe598c309ed54480c86a4d4e109dee5265351d5902d0c56

  • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\clrjit.dll

    Filesize

    1.2MB

    MD5

    b2eb7b51bd58201cf498e83846e90110

    SHA1

    ca439759b5c5162e626d2b84ab55b93adc552e06

    SHA256

    180557694842854789457a872df849b2130098a9c2bfd70d201f77bec6f9fddb

    SHA512

    1a92064b3417b287246fadd88fea9138dfcc659283e063aab9305e424feac0d1b2c216be5f65ce7a95f0322ab3849478892ae407399aa6029a504c4c8a5884da

  • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\coreclr.dll

    Filesize

    5.0MB

    MD5

    1c434dc8cb09095640c776385ba69691

    SHA1

    97fe8e25bebfb7d790768175a4625d07f3d4abfd

    SHA256

    3b3558c408c57be332c9595624f6d49413fe0dd43d3d5fa4626041851f77216a

    SHA512

    4bdb7c0e8571422927fbc8eec6d05959915748acce035fef336b32381922a0a54f029f959fb66cb96a89a024c11e2b94ee6948f618dd04d9ae87cc83f3f83ec8

  • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\vcruntime140_cor3.dll

    Filesize

    95KB

    MD5

    f34eb034aa4a9735218686590cba2e8b

    SHA1

    2bc20acdcb201676b77a66fa7ec6b53fa2644713

    SHA256

    9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

    SHA512

    d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

  • C:\Users\Admin\AppData\Local\Temp\.net\TheAltening\hOHr51s9Bz0M1wb5lZYsR6q9KnUsh1I=\wpfgfx_cor3.dll

    Filesize

    1.9MB

    MD5

    0c0be30d77de3f65e1c990b7d99143da

    SHA1

    fd9a4e456f56308d5bed48e7049de64e88a73833

    SHA256

    12a8b75ceecb6c5ce8ce81ad064aaf2bcb09d6338e5e03a7eddc57acd58e2a7d

    SHA512

    9a2a6acad9b21c3f093d4d72289f32ca6ebaee304c9a9e3ec9319558919452c3b2f23ea5e72c06c9af7a2a1ded0ce266e45f4fb9113d2bb3897320fcbdf7ebad

  • C:\Users\Admin\AppData\Local\Temp\TmpAFC8.tmp

    Filesize

    1KB

    MD5

    2f3de4f6d50debc5f7a35f6a0fb3ad88

    SHA1

    d0f2dcc536294e9cf364f1a2c08c9ecb2bcae02e

    SHA256

    cfc50ccc669a9ad9d4ec5980565235b71f8004c3659910ef1f82ae0119762882

    SHA512

    91bc8a527f858f77e39fa6adc220d719a223f55687f3ccdda0ced5f2298774e70fcb3a49cad20f158886399d4cd8e4cf247ae79df79fbc83c7142fb843c2c88e

  • C:\Users\Admin\AppData\Local\Temp\TmpBFC7.tmp

    Filesize

    1KB

    MD5

    d40a41a8d204d9353d85d7e926f9d25d

    SHA1

    698610c43c7e58218ac700d571a110ad152e5a6f

    SHA256

    ec0f6b35bbdfff51c56d44cc2524ab9126387fdefd6727a8974f313b9a3c2b04

    SHA512

    ce479718eb8fc93db3bca66e9d559b25d74dae9cfe26a8d106a891ee2a1b3c9f098ac7498713791dec4d62e955f3d7de291ef9d09fe3e50b1caf30bcd8a04f4f

  • memory/3652-68-0x0000020800930000-0x00000208009A1000-memory.dmp

    Filesize

    452KB

  • memory/3652-15-0x00007FFF9E4CA000-0x00007FFF9E4CB000-memory.dmp

    Filesize

    4KB

  • memory/3652-40-0x000002085CDE0000-0x000002085CDE4000-memory.dmp

    Filesize

    16KB

  • memory/3652-38-0x000002085CDB0000-0x000002085CDB4000-memory.dmp

    Filesize

    16KB

  • memory/3652-35-0x0000000180050000-0x00000001800CA000-memory.dmp

    Filesize

    488KB

  • memory/3652-21-0x0000000180110000-0x0000000180329000-memory.dmp

    Filesize

    2.1MB

  • memory/3652-45-0x00000644A00E0000-0x00000644A01CD000-memory.dmp

    Filesize

    948KB

  • memory/3652-48-0x00000644A0020000-0x00000644A0032000-memory.dmp

    Filesize

    72KB

  • memory/3652-54-0x00000644A0040000-0x00000644A005D000-memory.dmp

    Filesize

    116KB

  • memory/3652-51-0x000002087FED0000-0x000002087FF14000-memory.dmp

    Filesize

    272KB

  • memory/3652-24-0x000002085B5A0000-0x000002085B5AA000-memory.dmp

    Filesize

    40KB

  • memory/3652-26-0x000002087D720000-0x000002087D87B000-memory.dmp

    Filesize

    1.4MB

  • memory/3652-62-0x00000208006C0000-0x0000020800822000-memory.dmp

    Filesize

    1.4MB

  • memory/3652-65-0x0000020800590000-0x00000208005C2000-memory.dmp

    Filesize

    200KB

  • memory/3652-32-0x0000000080360000-0x0000000080BA1000-memory.dmp

    Filesize

    8.3MB

  • memory/3652-74-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

    Filesize

    5.1MB

  • memory/3652-29-0x00000644A0060000-0x00000644A00A5000-memory.dmp

    Filesize

    276KB

  • memory/3652-75-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

    Filesize

    5.1MB

  • memory/3652-18-0x00000001805C0000-0x0000000181517000-memory.dmp

    Filesize

    15.3MB

  • memory/3652-71-0x0000000180010000-0x000000018001D000-memory.dmp

    Filesize

    52KB

  • memory/3652-92-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

    Filesize

    5.1MB

  • memory/3652-93-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

    Filesize

    5.1MB

  • memory/3652-94-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

    Filesize

    5.1MB

  • memory/3652-96-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

    Filesize

    5.1MB

  • memory/3652-104-0x0000020803F30000-0x0000020803F36000-memory.dmp

    Filesize

    24KB

  • memory/3652-100-0x00000644A0C80000-0x00000644A18E6000-memory.dmp

    Filesize

    12.4MB

  • memory/3652-101-0x0000020808EA0000-0x0000020808F52000-memory.dmp

    Filesize

    712KB

  • memory/3652-12-0x000006448A000000-0x000006448A8F5000-memory.dmp

    Filesize

    9.0MB

  • memory/3652-109-0x00007FFF9E380000-0x00007FFF9E88F000-memory.dmp

    Filesize

    5.1MB