Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2024, 14:10

General

  • Target

    3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe

  • Size

    4.0MB

  • MD5

    3c4510f89e7cefa5316dd0170809a5af

  • SHA1

    3cff629e390af8a37ab0e82af2babab9ad6615d3

  • SHA256

    3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870

  • SHA512

    e5ec479ef6f3f7fb3e43e9c499930956e6fce136246ff0ef2ee563fbe54dc3052743c820c6df1ee5500aa96e011b3e6fb4f3e8f454cc6a282c599cc4e5cab2a8

  • SSDEEP

    49152:rVxwJxin6ea59xUQoBkHcYJs993X+s8KuqGaX0ToIBAUZLYep:jKxinS9oBk8YJs92JBAUZL7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • UPX packed file 41 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 16 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe
    "C:\Users\Admin\AppData\Local\Temp\3c56cb30624e9ca394ca44f0288d5d6052b15b3003d16535048b3fc7e0ecc870.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Windows\SysWOW64\RunDll32.exe
      RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 8
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1004
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:8 WinX:0 WinY:0 IEFrame:00000000
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2164
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
    1⤵
      PID:1480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FiddlerCore4.dll

      Filesize

      505KB

      MD5

      79fe5228b7ccdc88cf7ddba2893ea71f

      SHA1

      4313028e5354d66be81fd2103a16b16e1ad1a6f3

      SHA256

      5850d403352d76e7f7ebda93a7bff5ab1ea57c91a54a2f6c2cfaf1c9d356d55f

      SHA512

      f46380ccd2fcb8246206f176f17c1931d57c3bc1312c95e059cf9feab4bc392ad31fa6ffc6a1dac3b0bd70c5393ab1c2cf21729e357cb7c523d487dd92aacac3

    • C:\Users\Admin\AppData\Local\Temp\Tmp2EEF.tmp

      Filesize

      2KB

      MD5

      512c6ffff0f524c76822d61915505e41

      SHA1

      9e6f503cffc49965186f1e5124c7cbe5892c03ae

      SHA256

      7972524ba44b9aa36ba118d9808db920c0e4aeaf34fd02bb99c4db176b7ae0a8

      SHA512

      23b90b7332d46d43f4376c96ee38544ae6582cbe586e816ceec558b247ef7deb1acff30abe7ccdf1583d1dca66b5ac414860cfa4d64a80fd0cb3292950d3c8b1

    • C:\Users\Admin\AppData\Local\Temp\TmpCFC3.tmp

      Filesize

      2KB

      MD5

      fd3e0a3d1bdeeb84ea53be4d56e44572

      SHA1

      7f5e239a5c18e7e6a72bfe6687273106b164bc01

      SHA256

      3df78becd23d57d3742045e43debe4eeae5f6a931a44e7f8f673f0bfc02a83b4

      SHA512

      3eca6b1ca6550ad48c6fb38b6380fd603fe268fe2a35d5810d022700d7ce20ad23ba639524df41d9edc380014c825ae7aed9a322a660faa12ff02b6b3c7d262a

    • C:\Users\Admin\AppData\Local\Temp\TmpD321.tmp

      Filesize

      2KB

      MD5

      0a6f749ce748b2baacfd526804826f25

      SHA1

      df2a860df8a569bac70ba37cf5306ca477a2eb6c

      SHA256

      1d1d4c00d65f346f4cf5255fcfb8be1e2ce3e25414381773826e580c7d88a6b2

      SHA512

      f0a28a07e2f0e91a2d22557c8fd968539ec28ca229129fa66ba1e689ea4f54fadd1bb5c72e186151c2dd6e044686fcd745aee71aa71b252b5f781bac8a070c1d

    • C:\Users\Admin\AppData\Local\Temp\efd.dll

      Filesize

      38KB

      MD5

      82aff43dea5b7e114cb75f1a9c625b9a

      SHA1

      744f47a54429f23f49a36b45f7bd376d78110f36

      SHA256

      d5bcdb257b09fcf88e616206a17c9d65864ec1bcbf81b79ffcfd971fbd6f0f19

      SHA512

      8860c4fa405bd921d65241959218ba840a6ca8ec3fc9f3cd222bfd14edda073591f7323ae6e69c19a1e2d3beb39a9e1f3b52f19160f269dfa7ff78e7f600c65c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3350944739-639801879-157714471-1000\3cdc645c82cdfe6c82204fead9fc0b4f_dd2803c7-d377-4f06-bdfe-aea230fc7b0e

      Filesize

      2KB

      MD5

      c3da04f8570a46f51ccb4850304e8eb5

      SHA1

      386039238f9bdf0bc0820c6f0df24e5cdca60c54

      SHA256

      df6fb900ccfb8ea21b6384a1f33ceff14f0aba786ee9cfaca53af61e9bbee99f

      SHA512

      4e98c3ba3b341e82297b11635b9b7de16e96f1f33a5f5051eb8773d18c1c6b1f966e2365d33aacef9bdcbcab7f83754c6da2332544ec2be831f245905985babb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3350944739-639801879-157714471-1000\84cc91d4bddc3780affa406863d73357_dd2803c7-d377-4f06-bdfe-aea230fc7b0e

      Filesize

      2KB

      MD5

      9eedaf188bd0ec1931bf57358bf82a81

      SHA1

      2f45393b1a78ed67209ac5e85b6e9e70d228a5c2

      SHA256

      0f57e12d73cde050e5e8da1f25d5ef2ff3ed6d6efb4969821f330f0ec83b80a7

      SHA512

      3f76da1fdbcf6974d75dc2bec6e6a57cc726792e41a15805df4a8193f7a99449461506a063c0bf0b15fa82a5fa90deeb41d2399ec1a7e2a9e4b72696c8bb791d

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\D6759C0C577C89658F2725D062DB0BE5877FED08

      Filesize

      1KB

      MD5

      4627accfa08c41504971b06d2a499035

      SHA1

      975bab4827e4932104cee9fac9d7414d95c4244e

      SHA256

      976c6efa8ec0feedadb5ffa894a891c2fd9f15ea7f78e26943f7d4389c0fb28e

      SHA512

      81c1161bbab03b70e006bbc0cf4b05a98f7ba6adba10d14c7bea7af47f3b854992eab09c3d4ebc350cf29d1cc7db9c10bacde5ab13fd28628ea82204531a4b71

    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\DBE30873C6D51472AC5F9352BD6B29C6FA91D31C

      Filesize

      1KB

      MD5

      037321de7541df656cd48891542c27a7

      SHA1

      79596be3e9dc96945bad9f015f755970a207a73f

      SHA256

      c8313f13c1fc286bfcf774c3f72a2b7fabc2da8f054f88a6a533eb5973c62c18

      SHA512

      87a7f2aefe932669bb9fad279a2b6ef399441c8a50137e9089c1bff3f0c63774e6f5f6f215ed10a40d878da982c00db7e3bca16432627e45fee3ae92b86df0d5

    • memory/5068-81-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-70-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-111-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-134-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-109-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-107-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-105-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-103-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-101-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-99-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-97-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-95-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-93-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-92-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-89-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-88-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-87-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-83-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-84-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-45-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-78-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-74-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-72-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-90-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-64-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-62-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-60-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-55-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-56-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-53-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-51-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-47-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-91-0x0000000003810000-0x000000000384E000-memory.dmp

      Filesize

      248KB

    • memory/5068-76-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-67-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-41-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-43-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-186-0x0000000002C90000-0x0000000002CA0000-memory.dmp

      Filesize

      64KB

    • memory/5068-190-0x0000000008500000-0x000000000850E000-memory.dmp

      Filesize

      56KB

    • memory/5068-40-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-191-0x0000000073DA0000-0x0000000073DAE000-memory.dmp

      Filesize

      56KB

    • memory/5068-195-0x00000000085B0000-0x0000000008632000-memory.dmp

      Filesize

      520KB

    • memory/5068-196-0x0000000008650000-0x0000000008BF4000-memory.dmp

      Filesize

      5.6MB

    • memory/5068-198-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-282-0x0000000002C90000-0x0000000002CA0000-memory.dmp

      Filesize

      64KB

    • memory/5068-38-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/5068-39-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB