Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe
Resource
win10v2004-20241007-en
General
-
Target
3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe
-
Size
78KB
-
MD5
d1b0cbaad6725537e9d1dd41c4c5ea31
-
SHA1
7f5c4531fa1b3bf6b749dac24ea8e0c11d1b5e0d
-
SHA256
3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44
-
SHA512
dc478a735c33cb4563c401f6912250948e50754cb9e273f35c800d65c84a1d9cab6da14993174c32a2db40ffbd97c3332d74ceaa6d495b8052d0edbb681d5f87
-
SSDEEP
1536:zMCHF3uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qt89/J1PY:4CHFP3ZAtWDDILJLovbicqOq3o+n89/U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2140 tmpCFCD.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpCFCD.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpCFCD.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe Token: SeDebugPrivilege 2140 tmpCFCD.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3012 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe 31 PID 2380 wrote to memory of 3012 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe 31 PID 2380 wrote to memory of 3012 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe 31 PID 2380 wrote to memory of 3012 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe 31 PID 3012 wrote to memory of 2952 3012 vbc.exe 33 PID 3012 wrote to memory of 2952 3012 vbc.exe 33 PID 3012 wrote to memory of 2952 3012 vbc.exe 33 PID 3012 wrote to memory of 2952 3012 vbc.exe 33 PID 2380 wrote to memory of 2140 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe 34 PID 2380 wrote to memory of 2140 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe 34 PID 2380 wrote to memory of 2140 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe 34 PID 2380 wrote to memory of 2140 2380 3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe"C:\Users\Admin\AppData\Local\Temp\3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-bjecfga.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD099.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD098.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpCFCD.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpCFCD.tmp.exe" C:\Users\Admin\AppData\Local\Temp\3d1885a7ef245540379d764c975dd377a17cf23ca850fd7fa1080499f5898a44.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD56135427a2479e41b5ddd1e781f77037c
SHA12f6fcf2a9c2d043f5cd4b201955fbfaf5e92a8e9
SHA2565f82400f247b878b87479604cc7038db316bbbd99839b596200798d0170cce01
SHA512aa079eb4463eb22eb835ccbb11401318f35f960d34994402083e5477c6f209d9b2b7f7e484e170ea60b79339a957bfdeaa6592730bdaae7543e85b580189b688
-
Filesize
266B
MD525af1f92385b76b17ff840a43f29ab91
SHA1885af24331f335723674a40f3fa23a349ca8b294
SHA256bff421baec20a693e47fcf343df1f2215f2d3c325658c293de3719811fa03a36
SHA512765a185acd9cc7c27d13e586258ec2900fcd68020bedbad6ce2503174d8ad27501f2c7aca6af711a54efef3f8498ed3b83f25c5432ea07b728a85b89a4010cf4
-
Filesize
1KB
MD5ed14d97dd1dd336fa343949e52f9a11d
SHA161e2f2c919d87e07c6a21d62cb40170b2ffa43eb
SHA2567efc7ce7521aedafaffcf65c8cca86b9baa89dd0a95a8242de6b081864e95cf7
SHA5127f1d747bc414b53ec36092f2e0ee2db0c7a7b1df9e31dcb98239724e9b324f86f85184a49ec59e4eafb4e6c4dbe4d3401ad24603d516706d838147dbc581bf84
-
Filesize
78KB
MD5c18a56dca9d69d835cad951cf510a650
SHA194b4c024f8280d7bff434cd6c843db0fda3a5f4b
SHA256405346018cce86127a0d71017cd8fb2a6a7ba5b7f58ecc98e7e25332f06dc8bc
SHA512c27aae58de5c0fc75213d6410a91fd3094e2b984d28344d5ad97e790167b11ec5d8ca3275bad2be21cd4d1c5333221b90ab2b7238d11458286d55bc5f07826bc
-
Filesize
660B
MD586677339f43909c1233231020f1f2c6e
SHA1a75fb09227a7c969aa6235683a05ca5caaab59ec
SHA256e1a5e9c45b58613decc59110780eeb27d31ef3ebf8a6a34a430400c8576dd4b1
SHA512f242f6a2ab09141d278980bf54eebb0ab7a2890eb63daf79013a49e5ee9db9ddf3a034592e0ff95b38c4956edec4894b9a29bc8c4db9b227dfbbfa79566a5638
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c