Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 01:39

General

  • Target

    aef2f7385b5f565f24bb55fefe954f3b049c3ddcdbf46b44483c71f2a11959ad.exe

  • Size

    276KB

  • MD5

    312227127f518d57cf91f76e27718e82

  • SHA1

    d2c7d5ff34502776eea1f9d47a052beb2d3baf83

  • SHA256

    aef2f7385b5f565f24bb55fefe954f3b049c3ddcdbf46b44483c71f2a11959ad

  • SHA512

    4df90b73d925f5e97bc4b958b9f075f487c2b23baefbe68ec6ac7d903e9bde6382fb9d19d08f88af15fb625b81fa9b2bda1b53b6c6218e19ffc10e67ffd80328

  • SSDEEP

    6144:DsaocyLCicZIgFVWheUpDI9gGXMwPdsyF709smxmfRgHtU3bQ/1LODh8:DtobBU7UmfXMsdsyF70H4gH630J6C

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aef2f7385b5f565f24bb55fefe954f3b049c3ddcdbf46b44483c71f2a11959ad.exe
    "C:\Users\Admin\AppData\Local\Temp\aef2f7385b5f565f24bb55fefe954f3b049c3ddcdbf46b44483c71f2a11959ad.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\nsoC3CE.tmp\installer.exe
      C:\Users\Admin\AppData\Local\Temp\nsoC3CE.tmp\installer.exe 512e4fc0-18d4-4361-bb1e-3ca05bc06f2f.exe /t /dT131932004S /e9132222 /u512e4fc0-18d4-4361-bb1e-3ca05bc06f2f
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Users\Admin\AppData\Local\Temp\nsoC3CE.tmp\512e4fc0-18d4-4361-bb1e-3ca05bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsoC3CE.tmp\512e4fc0-18d4-4361-bb1e-3ca05bc06f2f.exe" /t /dT131932004S /e9132222 /u512e4fc0-18d4-4361-bb1e-3ca05bc06f2f
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12236C41CDDF9E40BA5606CDF086B821

    Filesize

    75KB

    MD5

    649540a5976b414717f289350dcd3bc2

    SHA1

    74df41d62d065686fd75f9886ff0992f015db3f7

    SHA256

    312e1163d4348ae1a44c468da02a2785f997c1f813ac535b8c71597f95602e1d

    SHA512

    6f8740060b1c25613a05143c436d954e40a810e41cddfae7a973cefe688062050ac8548f457e0c90dcee4f2e679afd23f518c33e89c93e8ccbe8a887e507fbc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    604B

    MD5

    3a0e39c53630ecfc2720aee27fe32557

    SHA1

    ce9b2fbd4efce495b07ac98b4cb54b12dd3cf3c0

    SHA256

    18da8779683e3e688ac75a896d738eb4e958763e153e56cb06432bafd3d6ef38

    SHA512

    3598a8fa245b68d4ea236355c00c80710105704efb08e889edea0afd79e079224083c0d034e6b2454189bb8057ea9037ae48e0791bc5b6c54a4af90541fda166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12236C41CDDF9E40BA5606CDF086B821

    Filesize

    202B

    MD5

    ba4ce1786f804db792b899ac1188012a

    SHA1

    73c78f41bab49bbbb34d1229ae58c5c0b42f00a7

    SHA256

    06a7debe19f0fc0d0beee9adba59ce6e13db546d37f1c45bf5c3ef635a5bf895

    SHA512

    2c3b262b697b18d583e94b60413079b11332d1ab198b0a86667b941676b725a34a33abaab52765e1e99ce6809f8cd84a3fac1f6770cb3ec8fdb531baaf84f264

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    188B

    MD5

    ad9d700cf70a96261ae188a51189e70d

    SHA1

    d2390020a51c3dcd237c42e6be97d99d3dc5dc30

    SHA256

    d8abd13a85338d0f6f49bc1a8c1e47dc14944c071e9191f4d78b31590b04b2a6

    SHA512

    fb936c3a3f8b029dde65648408ef33c88b65a414a2ad1aa9400d2dcb41504cdeec3dfc13f63d9436c98ea5cc1c8bbffeb406cb4e48b4cc29f165550b6ef8e135

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0521aed505c9ced95b0c26d9000e3b52

    SHA1

    93228426c187d3ca234708a5116fcf7adcb2511d

    SHA256

    b44aa6d478010e590aa873ecf47c09e0d8785804fbc2a9b5a46a3aba29249680

    SHA512

    84abfd27a37300062451ef609927c1011ce16b46cd79dcdcf6f0ee9de60bfff0205153fa8e21f966a00074541819550135535d441e3b20262c4fe55eb56852bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    404B

    MD5

    81c2fb46531576a176a7aa5cd8946d30

    SHA1

    aadb43b07a2678ed1d65b1d1c182c3a865307f03

    SHA256

    8165eaef1903985e68de57f7f54acde7b6e371d5b8b81558ca03f417e29376b7

    SHA512

    3b1f6f83786eeb9930a587b32f98b0a3536933eeb5862695a6fc8777bd363c94231c26609eae0e6c36be42860f410be81d7196a2af7091c0fe99097c2668bf36

  • C:\Users\Admin\AppData\Local\Temp\CabC583.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC5B4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nsoC3CE.tmp\512e4fc0-18d4-4361-bb1e-3ca05bc06f2f.exe

    Filesize

    256KB

    MD5

    6e68cf541f031c7de9da6ec8d86862aa

    SHA1

    115f143b5f585a27006159dc1b2d4d23a7af5295

    SHA256

    d1763b911eebce060a4c479190e83ff5747f5e75f938fb1cb23d5fcaba249e35

    SHA512

    022af872f2343293a0d71c6cc3ca3f13001ce7ad8e04cf740b75574272cad1dcb40a97a0e860082e7080a69a0367438728f1983317349d5a33ca969c3d877de1

  • \Users\Admin\AppData\Local\Temp\nsoC3CE.tmp\installer.exe

    Filesize

    214KB

    MD5

    7cf3bce5ecf2aea97b49e2eba8ca0aba

    SHA1

    543f5fc23df08f946488d27b2fb16b13b6311d1a

    SHA256

    7358afae03a24b31c0d82ee4e5fd2f17cafe6c3bdd8e26326aa4118f2169f736

    SHA512

    5f9184189940af27e25ae2988db8d15923dac81b2410c5fe3287f126fb50df43735fccb4e4d9f376e9f24700604c157aa1828622dab54014d9583a56ab698d8d

  • \Users\Admin\AppData\Local\Temp\nsoC3CE.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/1908-11-0x0000000074331000-0x0000000074332000-memory.dmp

    Filesize

    4KB

  • memory/1908-12-0x0000000074330000-0x00000000748DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1908-20-0x0000000074330000-0x00000000748DB000-memory.dmp

    Filesize

    5.7MB

  • memory/1908-95-0x0000000074330000-0x00000000748DB000-memory.dmp

    Filesize

    5.7MB

  • memory/2248-99-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB