Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 12:24

General

  • Target

    7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5N.exe

  • Size

    274KB

  • MD5

    0a7bd79d9cd424f7cf646a7883c6c400

  • SHA1

    8685a2b580bf964af97446a3229a34e32a38501e

  • SHA256

    7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5

  • SHA512

    ec268ad373b1f36f400383a75452a878212f98e59de075be899f31e5336d2b81f80a7208a7182eeff17982b797380f94c5f7db615cd01c13703a91fd073d62cc

  • SSDEEP

    6144:7saocyLCfcZxEQx8OXsk8Y018Y/+kY6F2hIWFl4WWlGTamELkTVS:7tobwQ+Ock8Y0hZYg2hIWFl5A+CLcVS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5N.exe
    "C:\Users\Admin\AppData\Local\Temp\7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\nso8816.tmp\installer.exe
      C:\Users\Admin\AppData\Local\Temp\nso8816.tmp\installer.exe 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe /t /dT131900333S /e5844780 /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\Temp\nso8816.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nso8816.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe" /t /dT131900333S /e5844780 /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12236C41CDDF9E40BA5606CDF086B821

    Filesize

    75KB

    MD5

    8b601e4a878a5f36fed27d3649df0030

    SHA1

    d198666c5bfa454ab6ca6cb28a5b47923bd2a3a6

    SHA256

    b149e2f1d25834aee44c8e7f9ba60e680862f969dfb00cedb523c8bb3209317a

    SHA512

    eed65ee83b24e8d9965bd507b48806ec51ba929b1a8cd645a15bb6fbd31cdbc784f6d79fef62790299acf287d3624bf55c5076901e4f5ede627aa053be64ad94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    604B

    MD5

    3a0e39c53630ecfc2720aee27fe32557

    SHA1

    ce9b2fbd4efce495b07ac98b4cb54b12dd3cf3c0

    SHA256

    18da8779683e3e688ac75a896d738eb4e958763e153e56cb06432bafd3d6ef38

    SHA512

    3598a8fa245b68d4ea236355c00c80710105704efb08e889edea0afd79e079224083c0d034e6b2454189bb8057ea9037ae48e0791bc5b6c54a4af90541fda166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    5B

    MD5

    4842e206e4cfff2954901467ad54169e

    SHA1

    80c9820ff2efe8aa3d361df7011ae6eee35ec4f0

    SHA256

    2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e

    SHA512

    ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12236C41CDDF9E40BA5606CDF086B821

    Filesize

    202B

    MD5

    e4b212a80c79a66134ad945fcf484ba2

    SHA1

    5070b3be1dc0576298bb1e8781fd965e9413da61

    SHA256

    e6c898661ec007ae40e960b7c8f89aa4919087add730584b9219553be8be6ce0

    SHA512

    610a8100c11fe316074d1a68510e3a7c7fb07b93c05dd888cd3e962a2e46b876d8c6c3aec64209ff46753b761b87e19b82b8060044e05aecce737eb9ae70e8b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    188B

    MD5

    0b8c7805e47a9cf58d58e4e47e32e53f

    SHA1

    79c6f25a8aab1d1ddf52bbf20b23fef02f4301f0

    SHA256

    0b67858b021e3dcefbadd8ce7dd5e1e25425ac106ef2758973fd31fb4f6c7557

    SHA512

    6abc55021d8d44b404cdb71ed8ca7f21293b186fbac7d58f4882fe95aec68dc965425a0d0484eac9343f5ccf4eb17a90c44a63f02f4f9bcbc6a12d4f6613351d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ee92179d1f43eaefc809fa257ae4e4b

    SHA1

    14c17be54bf1396ed1731cd27ef29596fba1e782

    SHA256

    2c35ada3468df71cc9bfb451918878987c32d0bd72421e6c22ea24d1ce118436

    SHA512

    e05015ead87f6ef60704a139a69c0b029b9b890371c81dd9a8607b22f573b03a79d0db1b9a8860963a77fc6eef4b5ff7b06e4302b1f1d9633d8abe662f087797

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    404B

    MD5

    e96eb7a78da42a010cc5c63b21c3fbaf

    SHA1

    542e18026799adaf3b4ab0a680daae8cd9978481

    SHA256

    e2b05a7721e48192b7bbebd0e5b1d0784a46c0af6a1a3d204c7f1f236b5ff735

    SHA512

    54e1bd32c3cc00654506a6860be3cfa345109309aa00d67fe3565447860d76eba3b0a4b0dcb1a527de9a9f95f586313ca65b73f59f1c9b4b4275cc2166126ba8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    482B

    MD5

    621ec37613792f9d41f310542c8b2d99

    SHA1

    83f4418c982d004196c3e1f61a336f0c8ec649fd

    SHA256

    44a1681c94f791dd61bb89b1754a944316337867d7791a8284877fec46d9ae82

    SHA512

    ad908118c77e422477d2091f974de237f35a673cc64348c12d400f96e5580348319ab131eb7a0cfb7dea53d5a95a167e222cb3f92137a93c0160eb7cc35183ce

  • C:\Users\Admin\AppData\Local\Temp\Cab8A38.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8A6A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nso8816.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

    Filesize

    256KB

    MD5

    6e68cf541f031c7de9da6ec8d86862aa

    SHA1

    115f143b5f585a27006159dc1b2d4d23a7af5295

    SHA256

    d1763b911eebce060a4c479190e83ff5747f5e75f938fb1cb23d5fcaba249e35

    SHA512

    022af872f2343293a0d71c6cc3ca3f13001ce7ad8e04cf740b75574272cad1dcb40a97a0e860082e7080a69a0367438728f1983317349d5a33ca969c3d877de1

  • \Users\Admin\AppData\Local\Temp\nso8816.tmp\installer.exe

    Filesize

    214KB

    MD5

    7cf3bce5ecf2aea97b49e2eba8ca0aba

    SHA1

    543f5fc23df08f946488d27b2fb16b13b6311d1a

    SHA256

    7358afae03a24b31c0d82ee4e5fd2f17cafe6c3bdd8e26326aa4118f2169f736

    SHA512

    5f9184189940af27e25ae2988db8d15923dac81b2410c5fe3287f126fb50df43735fccb4e4d9f376e9f24700604c157aa1828622dab54014d9583a56ab698d8d

  • \Users\Admin\AppData\Local\Temp\nso8816.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/1708-11-0x0000000073D71000-0x0000000073D72000-memory.dmp

    Filesize

    4KB

  • memory/1708-12-0x0000000073D70000-0x000000007431B000-memory.dmp

    Filesize

    5.7MB

  • memory/1708-20-0x0000000073D70000-0x000000007431B000-memory.dmp

    Filesize

    5.7MB

  • memory/1708-96-0x0000000073D70000-0x000000007431B000-memory.dmp

    Filesize

    5.7MB

  • memory/2100-100-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB