Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:18

General

  • Target

    f35d502490f7522150c06d1bd7ca12e2.exe

  • Size

    8.6MB

  • MD5

    f35d502490f7522150c06d1bd7ca12e2

  • SHA1

    5ff707c5084b287ae08886bc857d4a2b4ffd8793

  • SHA256

    af9968865c5173cb2b5af909bb34088bf51496c10ef91e26c054bde235bb519f

  • SHA512

    8fe5536968d1ad453a58644052a27731e3d1dc4c57553c68c4ad310d459276dd8d1c4e5a15b7d262d864ed0675cab0ba6ef6b2081fa3653cb4c6062df1b6bc4f

  • SSDEEP

    196608:t3/F4FE9vSMWU3wmIAYJVY5yJo20px+w71m:t3/F4F1mIfVY422Mx+V

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f35d502490f7522150c06d1bd7ca12e2.exe
    "C:\Users\Admin\AppData\Local\Temp\f35d502490f7522150c06d1bd7ca12e2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Users\Admin\Documents\mwps\mwps.exe
      "C:\Users\Admin\Documents\mwps\mwps.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Users\Admin\Documents\proDM\pdm.exe
        "C:\Users\Admin\Documents\proDM\pdm.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2160
      • C:\Users\Admin\Documents\comPM\cpm.exe
        "C:\Users\Admin\Documents\comPM\cpm.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
      • C:\Users\Admin\Documents\wpas mngr.exe
        "C:\Users\Admin\Documents\wpas mngr.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
    • C:\Users\Admin\Documents\Windows_Run_Ceneter_SIER\f35d502490f7522150c06d1bd7ca12e2.exe
      "C:\Users\Admin\Documents\Windows_Run_Ceneter_SIER\f35d502490f7522150c06d1bd7ca12e2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Users\Admin\AppData\Local\Temp\eset\bts.session\d256a299-1646-4585-b509-cf108bcde166\f35d502490f7522150c06d1bd7ca12e2.exe
        "C:\Users\Admin\AppData\Local\Temp\eset\bts.session\d256a299-1646-4585-b509-cf108bcde166\f35d502490f7522150c06d1bd7ca12e2.exe" --bts-container 2276 "C:\Users\Admin\Documents\Windows_Run_Ceneter_SIER\f35d502490f7522150c06d1bd7ca12e2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eset\bts.session\d256a299-1646-4585-b509-cf108bcde166\f35d502490f7522150c06d1bd7ca12e2.exe

    Filesize

    2.1MB

    MD5

    6e6fddaa8ecd3f759230a703dfce6d27

    SHA1

    2ef696bc30d0ba48aa2af5c94787d056557fe21b

    SHA256

    3bc0f49207c2589667d540a9ee638daed3f350a4e943de22f135590484fd41e6

    SHA512

    cfb112e71e0f1841607f4a73b1bbf4c38170736ecdbde3138927d71f6f584d07f95dfe4b0f066e936af968abcbb9f88eef2db48a0a4b800a6cbb63188c643fca

  • C:\Users\Admin\Documents\Windows_Run_Ceneter_SIER\f35d502490f7522150c06d1bd7ca12e2.exe

    Filesize

    8.6MB

    MD5

    e6873bdbb73ff60a4468f6e204cdbaee

    SHA1

    cb42c4061adfb90257beff9eff4929503e0c1fc5

    SHA256

    c74123c90df3ded1f9d091b278cf68ce798bb3c7d99b34a46ac0bdff29374045

    SHA512

    5cefe838d1da8c97b5664efc0c49e9e1652700bd16eb3fc1467bc54c05b2f124393d692df11034373fe496df060125baafdafc237f26be4f13e447f2c7e6cd45

  • C:\Users\Admin\Documents\comPM\cpm.exe

    Filesize

    13KB

    MD5

    015b69d2468b0454a04cc80027a65224

    SHA1

    00eea83b7c91f8ea797e238827ccbc403c985f8b

    SHA256

    ea65623a9e39191c0157c2cf541c397fecad15477c962594ee91033df463bd26

    SHA512

    9f562242a04a5fe9f5b4fe8e1edd2bf1b171b75c834317a74c05621cad0605ca19ad2b3028ae60b72841b982b73fd972609f3c37879a50ba3cf69bf1838ea2b0

  • \Users\Admin\Documents\mwps\mwps.exe

    Filesize

    80KB

    MD5

    307956cbcc6322cef0760b8bd174e081

    SHA1

    4524c29dc44d0a6af35c3091ff63593558d8e0c1

    SHA256

    32695f53c395ddaea37e5200349c9ad57d65c62fbc652265940ca9168604f5a7

    SHA512

    d3b61b9c08321eb9330ef55717bae55188401c89aa9284bea09357639c741e272dc217375dfe4e4be0e37958052a0c697c9aa3e387ec803a1d8b325a56eb737f

  • \Users\Admin\Documents\proDM\pdm.exe

    Filesize

    14KB

    MD5

    e21b44a5ba5f2cf25a31600ed5678aa3

    SHA1

    d651ad21f565aae56c31fd5efeec2c99424eaf3f

    SHA256

    a9831f4c9dc19ebd13158fd50c8df20e91b7a2568a142e9598f5e87da87aacd4

    SHA512

    bec72a0183fa6987cdcc1f528cd719d25bcb68233b77d3f6a0e4be3eeff084dc78c2e2b727c96e3a32326db358c7dc5359fdc657aa02115bfd7220413c206383

  • \Users\Admin\Documents\wpas mngr.exe

    Filesize

    14KB

    MD5

    e03b00824eb87cdf8a4af0158b9f03b9

    SHA1

    39d5d69b3f4e265e44b414ff98323e7332d4984c

    SHA256

    482a1c183b8db36574a67afcaad6057386c594480ac6e9b6fd31af6d19356524

    SHA512

    cddecdeabee507dcfdb4846ffb14ab6a95930b97be6bf4630feff1378d2b1386ef6feaeda84bc2b8386e5fea7724c19d95ad3e4c47561dd5e64365e52346cfd1

  • memory/2228-10-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB

  • memory/2228-12-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB

  • memory/2228-50-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB

  • memory/2916-0-0x0000000074531000-0x0000000074532000-memory.dmp

    Filesize

    4KB

  • memory/2916-17-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB

  • memory/2916-2-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB

  • memory/2916-1-0x0000000074530000-0x0000000074ADB000-memory.dmp

    Filesize

    5.7MB