Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 05:20 UTC

General

  • Target

    5904e14815600b23c36de9fc5f53b3e3a0a6c228f65593b508caed5b99ab4263.exe

  • Size

    100KB

  • MD5

    824a487ce55ab33c469dec77677b4489

  • SHA1

    a5ea51f308731d6931bd5960716e1e87f3c9e377

  • SHA256

    5904e14815600b23c36de9fc5f53b3e3a0a6c228f65593b508caed5b99ab4263

  • SHA512

    73e6bbc559c771b1cc8c607645c8ef9f7106adb7870a994f05dc8e5ccbd76e32265db19467b73ade9f44f9cb51df85ec45c028da76da2cae261f49e2611641ef

  • SSDEEP

    3072:ClmPJNSSJhZHN9mN0DuoWjr0Tv7ubsSKlc:/PJNNzmJVro79HC

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1108
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1172
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1228
          • C:\Users\Admin\AppData\Local\Temp\5904e14815600b23c36de9fc5f53b3e3a0a6c228f65593b508caed5b99ab4263.exe
            "C:\Users\Admin\AppData\Local\Temp\5904e14815600b23c36de9fc5f53b3e3a0a6c228f65593b508caed5b99ab4263.exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Windows security modification
            • Checks whether UAC is enabled
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2328
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1080

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • F:\wvir.exe

            Filesize

            100KB

            MD5

            ee42bcff0fa7b0d1ab64e1e055dd4b4f

            SHA1

            3772bc0276e29901757e7566d3949f7155b6ee4d

            SHA256

            849f844cba2d40ff701edb710b9363184d6980a4e6da5279722d552b653a6c53

            SHA512

            b4a73b937aba754d7a3e636ef47e8f110d61501e02fced5751ae9111c2c75415f4b4ae0382eecc0a4584968bc515da9d49cf3587ff0b0c3a6aa17db4f9cdd2cc

          • memory/1108-11-0x0000000000320000-0x0000000000322000-memory.dmp

            Filesize

            8KB

          • memory/2328-27-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-3-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-5-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-9-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-24-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2328-23-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2328-22-0x00000000032E0000-0x00000000032E1000-memory.dmp

            Filesize

            4KB

          • memory/2328-19-0x00000000032E0000-0x00000000032E1000-memory.dmp

            Filesize

            4KB

          • memory/2328-18-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2328-6-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-8-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-7-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-4-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-10-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-25-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-26-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-28-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-0-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          • memory/2328-54-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-31-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-43-0x00000000040A0000-0x00000000040A2000-memory.dmp

            Filesize

            8KB

          • memory/2328-42-0x0000000004220000-0x0000000004221000-memory.dmp

            Filesize

            4KB

          • memory/2328-45-0x00000000040A0000-0x00000000040A2000-memory.dmp

            Filesize

            8KB

          • memory/2328-44-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-47-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2328-48-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-49-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-52-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-29-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-56-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-58-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-60-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-62-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-64-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-1-0x0000000001DC0000-0x0000000002E4E000-memory.dmp

            Filesize

            16.6MB

          • memory/2328-140-0x0000000000400000-0x0000000000414000-memory.dmp

            Filesize

            80KB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.