Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2022, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
USD92.15.exe
Resource
win7-20220812-en
General
-
Target
USD92.15.exe
-
Size
997KB
-
MD5
7b711b729b01c38bbbed5ee08ef88347
-
SHA1
45c70d807a9b741aec980b559ebec0c79a4cd1a0
-
SHA256
6bf5a3809ca423061cb16a815ca5e5f3ba86d6c7fbf5233fd68b589012eae0ab
-
SHA512
b94950da81e664bb2248411c39adb748f2042cad9e03ed4c212913e1b6e861d99e174b39e90084eaeeeaae6e067af7fd164ecf20d2f115a0ae77ffa9156f4581
-
SSDEEP
12288:vJ6ShV7uikFgEeYeFav5bq5/wA9IVBrFPVgIBzcJtNv2j:h9hlubgSeFOb6/6frFPVXBzcRI
Malware Config
Extracted
formbook
ejgp
+0NM3RekW0bfgQ==
iQmI3Aw2aoOljoA0XZi1
5Ei2CVwQyOgZwV/u4eiMFdKqc84=
ImSvoul9o0reZ9TKUAUkXgw=
kuCrMIco5vT3sxCUQ+pYsVoG7Q==
btgpLo8XM+qHGLzoizgjRg==
fqK2iM5vW0bfgQ==
ObS1UE+TByKRZozamdULr0naXbKPLA==
bcohBkmNNcpp3gJ/XE2/mBs=
yY5b/cLb3+0llg==
GVEVqBNXl7Kic2Sm
Tqpt2tTlW0bfgQ==
eurYRI7UFDBjDbzpIJKz
7wwDuczemAaJNrrpIJKz
bprQyLvLEj+hhMLHHg==
qdoAqq/XOjh0ItzLLJpHBgxoJgM2
gr5SnMA66BpM8+hUM+iawNKeZsQ=
XLoO6yFTsdNuEYpUPfScwqXEk7dqBnU=
vS2Cjfg0tqBF1GpuHemLV8/g4wUwPspS
U5wqXJjP/u/qg3sE+YKsgVVByFw+
6Qul0MI57A40ueX7Uh8=
IGr1GFkQxOYclTlq1dWwCpfrYMI=
cqLh+QczhrzdZ2/pIJKz
HGi2j8gM2ZZA59e8Fw==
htYvQKbmdF0SvUP67ebXcmE3/uzNMA==
5v+uDDzlnYEi1ys=
HZgZRHcj3fw3GH2WCQ==
RrCaR398Tdju
b5upYoKjGFXjloTNQrLms2lByFw+
Q7qnTXgEBa+lHRZKrRuPlU9YZLdqBnU=
D6clUYImrLoeAHaqFA==
xdrcmoa+AO/ZYVXk5sFpEtKeZsQ=
erJYeX6DtVY13U11VhE=
/D4wGJyUf5zg
uDNlLJ19Zvw=
e63EgpreYHnpZYPp1dH3jRE=
oAPyvNkPg48R8KipH1pQ5IF+TZrce3/+wA==
w/i5TF+hHlGzaZhUS+5hH+hmTNzxpAVa
ke0iGwcm3+0llg==
bbGaZYKNNrQSyflWyj2oBpcs
ha++gwt5rlQFqw1AQAg=
scSTL3/FbwOXHqajWkgqmh0=
H4jWx7vLqks1vMokkMz8Kuz4Q1aKOA==
0CViYGqjx2gOrg1AQAg=
XqhAovm0cUgU4nwrHA==
s9DajO14+Pg00F5cycZfDdKeZsQ=
/HLFmNRxdB8z3Q1AQAg=
MsYIc6M9vORxWJegDQ==
a+NfdmuRfybXudoLcbTZsUchqC4n
XMCW+zV1raKke7MgExDNZXH8+g==
r99wvAFBhLrneJhGGpLIpmlByFw+
HGgnm5S6dOdvFrTjizgjRg==
YLDq+w1ChoRmBzaUen3gul1u+w==
pu6vTWRtJ6cZAHaqFA==
nAaG1vUgYkodsNJdUE2/mBs=
X4qhboKOVCMz3Q1AQAg=
pt2iMklSGz6NIhtaufwrUg==
6UyWemOlpFZoBCTe5NUBhwY=
Ycwg9jPgC75kB59QizgjRg==
grRAZIkanoVJ3Xs5HQ==
Ep4taphAwK6ic2Sm
SW5qJj5D6BfSgA==
R7gN/vcdVnJ/i8AHeO9ldkhW3XDPNMhS
JEJUAPMTjbY9DrrpIJKz
naik138rtp.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation USD92.15.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3968 set thread context of 3512 3968 USD92.15.exe 93 PID 3512 set thread context of 2832 3512 RegSvcs.exe 33 PID 4724 set thread context of 2832 4724 mstsc.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1540 schtasks.exe -
description ioc Process Key created \Registry\User\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 3968 USD92.15.exe 3968 USD92.15.exe 224 powershell.exe 3512 RegSvcs.exe 3512 RegSvcs.exe 3512 RegSvcs.exe 3512 RegSvcs.exe 3512 RegSvcs.exe 3512 RegSvcs.exe 3512 RegSvcs.exe 3512 RegSvcs.exe 224 powershell.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3512 RegSvcs.exe 3512 RegSvcs.exe 3512 RegSvcs.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe 4724 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3968 USD92.15.exe Token: SeDebugPrivilege 224 powershell.exe Token: SeDebugPrivilege 3512 RegSvcs.exe Token: SeDebugPrivilege 4724 mstsc.exe Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3968 USD92.15.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3968 USD92.15.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3968 wrote to memory of 224 3968 USD92.15.exe 89 PID 3968 wrote to memory of 224 3968 USD92.15.exe 89 PID 3968 wrote to memory of 224 3968 USD92.15.exe 89 PID 3968 wrote to memory of 1540 3968 USD92.15.exe 91 PID 3968 wrote to memory of 1540 3968 USD92.15.exe 91 PID 3968 wrote to memory of 1540 3968 USD92.15.exe 91 PID 3968 wrote to memory of 3512 3968 USD92.15.exe 93 PID 3968 wrote to memory of 3512 3968 USD92.15.exe 93 PID 3968 wrote to memory of 3512 3968 USD92.15.exe 93 PID 3968 wrote to memory of 3512 3968 USD92.15.exe 93 PID 3968 wrote to memory of 3512 3968 USD92.15.exe 93 PID 3968 wrote to memory of 3512 3968 USD92.15.exe 93 PID 2832 wrote to memory of 4724 2832 Explorer.EXE 94 PID 2832 wrote to memory of 4724 2832 Explorer.EXE 94 PID 2832 wrote to memory of 4724 2832 Explorer.EXE 94 PID 4724 wrote to memory of 3700 4724 mstsc.exe 95 PID 4724 wrote to memory of 3700 4724 mstsc.exe 95 PID 4724 wrote to memory of 3700 4724 mstsc.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\USD92.15.exe"C:\Users\Admin\AppData\Local\Temp\USD92.15.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UWqtQgp.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UWqtQgp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp13B7.tmp"3⤵
- Creates scheduled task(s)
PID:1540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3700
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD523a31cef18fccdf750ca602e93a0c3da
SHA10cb0c4c3a5f36b1b1d28243c4dd250201b0d3a3a
SHA25635e574b052bf191df732238aef1d61cd7e5c31e43c98af5aae779901f4246875
SHA5125d29af8e4541c617224e47445414c1814bcb02cdf6342ef7c175a4dec3cd3354504e750a541db1413c954655e36590a77bacfc37902cb26c38e47e19f7752d57