Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2022, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
swift code.exe
Resource
win7-20220812-en
General
-
Target
swift code.exe
-
Size
929KB
-
MD5
4810babd170ef3c7d890a2898237342f
-
SHA1
e12471750e0a24c3835a632249c544d453196561
-
SHA256
d06e9a0bc38a688ec308ebf3b7806de3d4f13bc7e630f1c34f8e2356a9123e10
-
SHA512
54e234ad0177c1dd599b112c4df4a0766e9c6b0855256221d6df4f85143a504b881f58892f5928816120be716ed4094d2630b0dd8b50122b47eb13218f8305cc
-
SSDEEP
12288:Dvbx1O4xoFLbbvQE550OZmwNwO051Gf1k2DtLLTp3QDkJBhsvt+:vcFLXvd5+9wNN051+hLHpKkB48
Malware Config
Extracted
formbook
ejgp
+0NM3RekW0bfgQ==
iQmI3Aw2aoOljoA0XZi1
5Ei2CVwQyOgZwV/u4eiMFdKqc84=
ImSvoul9o0reZ9TKUAUkXgw=
kuCrMIco5vT3sxCUQ+pYsVoG7Q==
btgpLo8XM+qHGLzoizgjRg==
fqK2iM5vW0bfgQ==
ObS1UE+TByKRZozamdULr0naXbKPLA==
bcohBkmNNcpp3gJ/XE2/mBs=
yY5b/cLb3+0llg==
GVEVqBNXl7Kic2Sm
Tqpt2tTlW0bfgQ==
eurYRI7UFDBjDbzpIJKz
7wwDuczemAaJNrrpIJKz
bprQyLvLEj+hhMLHHg==
qdoAqq/XOjh0ItzLLJpHBgxoJgM2
gr5SnMA66BpM8+hUM+iawNKeZsQ=
XLoO6yFTsdNuEYpUPfScwqXEk7dqBnU=
vS2Cjfg0tqBF1GpuHemLV8/g4wUwPspS
U5wqXJjP/u/qg3sE+YKsgVVByFw+
6Qul0MI57A40ueX7Uh8=
IGr1GFkQxOYclTlq1dWwCpfrYMI=
cqLh+QczhrzdZ2/pIJKz
HGi2j8gM2ZZA59e8Fw==
htYvQKbmdF0SvUP67ebXcmE3/uzNMA==
5v+uDDzlnYEi1ys=
HZgZRHcj3fw3GH2WCQ==
RrCaR398Tdju
b5upYoKjGFXjloTNQrLms2lByFw+
Q7qnTXgEBa+lHRZKrRuPlU9YZLdqBnU=
D6clUYImrLoeAHaqFA==
xdrcmoa+AO/ZYVXk5sFpEtKeZsQ=
erJYeX6DtVY13U11VhE=
/D4wGJyUf5zg
uDNlLJ19Zvw=
e63EgpreYHnpZYPp1dH3jRE=
oAPyvNkPg48R8KipH1pQ5IF+TZrce3/+wA==
w/i5TF+hHlGzaZhUS+5hH+hmTNzxpAVa
ke0iGwcm3+0llg==
bbGaZYKNNrQSyflWyj2oBpcs
ha++gwt5rlQFqw1AQAg=
scSTL3/FbwOXHqajWkgqmh0=
H4jWx7vLqks1vMokkMz8Kuz4Q1aKOA==
0CViYGqjx2gOrg1AQAg=
XqhAovm0cUgU4nwrHA==
s9DajO14+Pg00F5cycZfDdKeZsQ=
/HLFmNRxdB8z3Q1AQAg=
MsYIc6M9vORxWJegDQ==
a+NfdmuRfybXudoLcbTZsUchqC4n
XMCW+zV1raKke7MgExDNZXH8+g==
r99wvAFBhLrneJhGGpLIpmlByFw+
HGgnm5S6dOdvFrTjizgjRg==
YLDq+w1ChoRmBzaUen3gul1u+w==
pu6vTWRtJ6cZAHaqFA==
nAaG1vUgYkodsNJdUE2/mBs=
X4qhboKOVCMz3Q1AQAg=
pt2iMklSGz6NIhtaufwrUg==
6UyWemOlpFZoBCTe5NUBhwY=
Ycwg9jPgC75kB59QizgjRg==
grRAZIkanoVJ3Xs5HQ==
Ep4taphAwK6ic2Sm
SW5qJj5D6BfSgA==
R7gN/vcdVnJ/i8AHeO9ldkhW3XDPNMhS
JEJUAPMTjbY9DrrpIJKz
naik138rtp.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation swift code.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1556 set thread context of 3236 1556 swift code.exe 103 PID 3236 set thread context of 512 3236 RegSvcs.exe 16 PID 2224 set thread context of 512 2224 explorer.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1140 schtasks.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 explorer.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1556 swift code.exe 1556 swift code.exe 1596 powershell.exe 3236 RegSvcs.exe 3236 RegSvcs.exe 3236 RegSvcs.exe 3236 RegSvcs.exe 3236 RegSvcs.exe 3236 RegSvcs.exe 3236 RegSvcs.exe 3236 RegSvcs.exe 1596 powershell.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 512 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3236 RegSvcs.exe 3236 RegSvcs.exe 3236 RegSvcs.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe 2224 explorer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1556 swift code.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 3236 RegSvcs.exe Token: SeDebugPrivilege 2224 explorer.exe Token: SeShutdownPrivilege 512 Explorer.EXE Token: SeCreatePagefilePrivilege 512 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1556 wrote to memory of 1596 1556 swift code.exe 98 PID 1556 wrote to memory of 1596 1556 swift code.exe 98 PID 1556 wrote to memory of 1596 1556 swift code.exe 98 PID 1556 wrote to memory of 1140 1556 swift code.exe 100 PID 1556 wrote to memory of 1140 1556 swift code.exe 100 PID 1556 wrote to memory of 1140 1556 swift code.exe 100 PID 1556 wrote to memory of 3236 1556 swift code.exe 103 PID 1556 wrote to memory of 3236 1556 swift code.exe 103 PID 1556 wrote to memory of 3236 1556 swift code.exe 103 PID 1556 wrote to memory of 3236 1556 swift code.exe 103 PID 1556 wrote to memory of 3236 1556 swift code.exe 103 PID 1556 wrote to memory of 3236 1556 swift code.exe 103 PID 512 wrote to memory of 2224 512 Explorer.EXE 104 PID 512 wrote to memory of 2224 512 Explorer.EXE 104 PID 512 wrote to memory of 2224 512 Explorer.EXE 104 PID 2224 wrote to memory of 4584 2224 explorer.exe 111 PID 2224 wrote to memory of 4584 2224 explorer.exe 111 PID 2224 wrote to memory of 4584 2224 explorer.exe 111
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\swift code.exe"C:\Users\Admin\AppData\Local\Temp\swift code.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pqFexk.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pqFexk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp22CA.tmp"3⤵
- Creates scheduled task(s)
PID:1140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4584
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58a921f16c85c4cd1af71da637c130f22
SHA190f64c236c1ea13678f9dd5409b39929ed8fb098
SHA2565cbd13fc48d4c4f66194f435184d24c8eb8b7166cce1d86c0af4fc92f44c59d8
SHA51285ae4c9db7e79273d8f0067d662b04bff2d151553d1ee9239c9d840b0e2e7e6903f7260a820e0aa73d38cb84b8322ff2f976f84ae3dfe11b690e520db370ae25