Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 09:33

General

  • Target

    启动VK.exe

  • Size

    44KB

  • MD5

    b9d83695fd09784e44213c62a5f350fc

  • SHA1

    e4d822e72d30badae5116263360c6d2ae1aaa819

  • SHA256

    e6697e51280e96d33ca7cd8bef7d8590f30e8d01420e4666c5e7a8de8bb3093a

  • SHA512

    610fa68978ae298e852e469f31c90038107a170e936c5461f35c658ff2edbe29e4fad89219e0603210ccf7dacc989722842d340495178615b30e93c70b181e8d

  • SSDEEP

    384:lBdQaH8DN3lFWqSsToP1lyU0hmtHEL0hmEoP1ly+FWqSsCdQaH8DN3:lBdLcp1gsov9vHELaovJgpdLcp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\启动VK.exe
    "C:\Users\Admin\AppData\Local\Temp\启动VK.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\AppData\Local\Temp\v\1597908629.exe
      C:\Users\Admin\AppData\Local\Temp\v\1597908629.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Users\Admin\AppData\Local\Temp\v\1597908629.exe
        "C:\Users\Admin\AppData\Local\Temp\v\1597908629.exe"
        3⤵
        • Executes dropped EXE
        PID:10716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa6f4e6f15175d29ea2aaeaccc680dd1

    SHA1

    e20f2f177f48bc128a872105362c625354db9f20

    SHA256

    822e9e52b3839fa64b94ac3f5483e25ebe0e663f283860e603611bd20a8ed237

    SHA512

    2647b32b6faf9c472feda806754abe836cb0de455b8f275495d986c337b211bc6c464b243b9c43ba0a721fa93d2b2c1b9b06dd6db9c677600f27d1352eddadce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38e236e3041e524ba71a75ddb705d44f

    SHA1

    a3e9914ede6f787d506e46553c7a40f3417922fb

    SHA256

    93420b106e9619a243ec75c5962f91b99e1c8d4e865ae07a305988a39d3ca2b8

    SHA512

    eb3f973b56b7325c89f125ecdfea17dc805b44c35a6b4ba15a3a21a0d34cb5e15644e6b06cc8e41167656372c438febb0b5e0c7c20b37973d38b9f331402ff9d

  • C:\Users\Admin\AppData\Local\Temp\CabDA5B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDA7D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\SEBDE3.tmp

    Filesize

    1024B

    MD5

    12871388b682b159ddd85545302a289d

    SHA1

    76b47377da188fcfddeefa0f940287f1cce9885d

    SHA256

    cc033f00e96cae1829e3a5c15150fe68a62f65440f1b158d9257370fbc488a9b

    SHA512

    d60953b62d08e52fa2860db257e2bdbaa97e7eff7007617857f7b30a76f7c7ba81f8444d313a6ad496adbbaede5af1661e72522046789bb9aee1340f7ac12c7d

  • \Users\Admin\AppData\Local\Temp\v\1597908629.exe

    Filesize

    2.1MB

    MD5

    9258e953a69effc9dfcfeafd537f628a

    SHA1

    cc790128e9c33d8c477431145493fdfe1121c930

    SHA256

    8026cdcce789155e7bb0b56dc8027f78775363e4c3dd6b5d2dc182dda85f7edd

    SHA512

    88a4f2c1044654cb1ebf50e9de0215111813527199fc5954627173032bbbce5300e5826a1f62f216634cf1c3109cc858f52e75277f45c52b0d12fedeef4a44fa

  • memory/316-518-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-578-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-546-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-544-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-542-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-540-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-538-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-536-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-534-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-532-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-530-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-528-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-526-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-524-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-522-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-520-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-556-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-517-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-15-0x0000000075D60000-0x0000000075DA7000-memory.dmp

    Filesize

    284KB

  • memory/316-548-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-576-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-2253-0x00000000028F0000-0x0000000002A71000-memory.dmp

    Filesize

    1.5MB

  • memory/316-574-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-572-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-570-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-564-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-562-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-560-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-558-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-554-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-552-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-550-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-566-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-7597-0x00000000030D0000-0x00000000032DE000-memory.dmp

    Filesize

    2.1MB

  • memory/316-568-0x0000000002BA0000-0x0000000002CB1000-memory.dmp

    Filesize

    1.1MB

  • memory/316-8124-0x00000000030D0000-0x00000000032DE000-memory.dmp

    Filesize

    2.1MB

  • memory/316-8123-0x0000000000400000-0x000000000060E000-memory.dmp

    Filesize

    2.1MB

  • memory/316-14-0x0000000000400000-0x000000000060E000-memory.dmp

    Filesize

    2.1MB

  • memory/2912-13-0x0000000002BC0000-0x0000000002DCE000-memory.dmp

    Filesize

    2.1MB

  • memory/2912-12-0x0000000002BC0000-0x0000000002DCE000-memory.dmp

    Filesize

    2.1MB