Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    123s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/12/2024, 06:20 UTC

General

  • Target

    3af3f58525555cc4e5656d30c5df2d292bb0ee512e1af95243a6d33d54d54c80.exe

  • Size

    1.2MB

  • MD5

    911276092cc0ac0b5fae2c4ce4382b0d

  • SHA1

    424189fe13b8168989e9a6553394ad4720411acc

  • SHA256

    3af3f58525555cc4e5656d30c5df2d292bb0ee512e1af95243a6d33d54d54c80

  • SHA512

    b785af74041b72f3cbd316a4ff8ff284ef68fb79fb372c81ddc9345aecbc77a4975f94ae122217030806b89d32f64b2f4bcdfbc7c6735327ed5a2a1906b8b1b4

  • SSDEEP

    24576:iagIvCEBXufFWij4EBbjQjcKIzs2JhoYQwORdYJK4kBkhX:DXwHpcszs2LQ3RCI4OkhX

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Modifies firewall policy service 3 TTPs 3 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • UPX packed file 30 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1068
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1156
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1196
          • C:\Users\Admin\AppData\Local\Temp\3af3f58525555cc4e5656d30c5df2d292bb0ee512e1af95243a6d33d54d54c80.exe
            "C:\Users\Admin\AppData\Local\Temp\3af3f58525555cc4e5656d30c5df2d292bb0ee512e1af95243a6d33d54d54c80.exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Windows security modification
            • Checks whether UAC is enabled
            • Enumerates connected drives
            • Drops autorun.inf file
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2372
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1192

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • F:\wkskvu.pif

            Filesize

            97KB

            MD5

            605087a8f2c37fdd7a6171c26c388d70

            SHA1

            481adb761e1d4a99a86d539ed68baa1e81f5ea71

            SHA256

            da361556db3b571998ee5bbd3a780a12a22c3334d3fb83b532f439a403e5a366

            SHA512

            8130d2c5303b1b40b7efd41dfa178290743d2b0504bd9c366dc1ad650dd65b071f6cf8f2b69c76a387d4a7dfbddffc90ce7d2f5904dd21b361b1b555f6f1ddd8

          • memory/1068-13-0x0000000000390000-0x0000000000392000-memory.dmp

            Filesize

            8KB

          • memory/2372-39-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-38-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-41-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-28-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2372-27-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2372-22-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2372-30-0x00000000030A0000-0x00000000030A1000-memory.dmp

            Filesize

            4KB

          • memory/2372-1-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-12-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-11-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-9-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-8-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-6-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-5-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-4-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-3-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-10-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-36-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-35-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-37-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-26-0x0000000002F30000-0x0000000002F31000-memory.dmp

            Filesize

            4KB

          • memory/2372-0-0x0000000000400000-0x0000000000536000-memory.dmp

            Filesize

            1.2MB

          • memory/2372-23-0x0000000002F30000-0x0000000002F31000-memory.dmp

            Filesize

            4KB

          • memory/2372-42-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-43-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-45-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-47-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/2372-48-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-63-0x0000000004E90000-0x0000000004E92000-memory.dmp

            Filesize

            8KB

          • memory/2372-62-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

            Filesize

            4KB

          • memory/2372-64-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-65-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-67-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-69-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-71-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-74-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-75-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-78-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-79-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-91-0x0000000004E90000-0x0000000004E92000-memory.dmp

            Filesize

            8KB

          • memory/2372-7-0x0000000001DB0000-0x0000000002E6A000-memory.dmp

            Filesize

            16.7MB

          • memory/2372-165-0x0000000000400000-0x0000000000536000-memory.dmp

            Filesize

            1.2MB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.