Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe
Resource
win10v2004-20220812-en
General
-
Target
4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe
-
Size
284KB
-
MD5
12134afc08cc6eec52ab045a27ccc557
-
SHA1
84e3f1278c9c79d4312a4d10178e0d12da3dda98
-
SHA256
4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71
-
SHA512
7cea96310c64b634900e8f74d8575dee45f4fa3f69b0f0528876c1a6a62b8e071e0632d7455f6c3d088efbcbdc69bd041665d2bd2ee8bf947389e4dd0f83209b
-
SSDEEP
3072:mSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:mPA6wxmuJspr2l
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\16264 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msvdlk.exe" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2356 skyrpe.exe 3668 skyrpe.exe 1504 skyrpe.exe -
resource yara_rule behavioral2/memory/4964-135-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4964-137-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4964-138-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4964-141-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4964-150-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3668-163-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4964-165-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3668-168-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\skype\\skyrpe.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 skyrpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum skyrpe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4988 set thread context of 4964 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 89 PID 2356 set thread context of 3668 2356 skyrpe.exe 95 PID 2356 set thread context of 1504 2356 skyrpe.exe 96 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msvdlk.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 skyrpe.exe 1504 skyrpe.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1504 skyrpe.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe Token: SeDebugPrivilege 3668 skyrpe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 4964 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 2356 skyrpe.exe 3668 skyrpe.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4964 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 89 PID 4988 wrote to memory of 4964 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 89 PID 4988 wrote to memory of 4964 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 89 PID 4988 wrote to memory of 4964 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 89 PID 4988 wrote to memory of 4964 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 89 PID 4988 wrote to memory of 4964 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 89 PID 4988 wrote to memory of 4964 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 89 PID 4988 wrote to memory of 4964 4988 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 89 PID 4964 wrote to memory of 3344 4964 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 90 PID 4964 wrote to memory of 3344 4964 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 90 PID 4964 wrote to memory of 3344 4964 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 90 PID 3344 wrote to memory of 1904 3344 cmd.exe 93 PID 3344 wrote to memory of 1904 3344 cmd.exe 93 PID 3344 wrote to memory of 1904 3344 cmd.exe 93 PID 4964 wrote to memory of 2356 4964 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 94 PID 4964 wrote to memory of 2356 4964 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 94 PID 4964 wrote to memory of 2356 4964 4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe 94 PID 2356 wrote to memory of 3668 2356 skyrpe.exe 95 PID 2356 wrote to memory of 3668 2356 skyrpe.exe 95 PID 2356 wrote to memory of 3668 2356 skyrpe.exe 95 PID 2356 wrote to memory of 3668 2356 skyrpe.exe 95 PID 2356 wrote to memory of 3668 2356 skyrpe.exe 95 PID 2356 wrote to memory of 3668 2356 skyrpe.exe 95 PID 2356 wrote to memory of 3668 2356 skyrpe.exe 95 PID 2356 wrote to memory of 3668 2356 skyrpe.exe 95 PID 2356 wrote to memory of 1504 2356 skyrpe.exe 96 PID 2356 wrote to memory of 1504 2356 skyrpe.exe 96 PID 2356 wrote to memory of 1504 2356 skyrpe.exe 96 PID 2356 wrote to memory of 1504 2356 skyrpe.exe 96 PID 2356 wrote to memory of 1504 2356 skyrpe.exe 96 PID 2356 wrote to memory of 1504 2356 skyrpe.exe 96 PID 1504 wrote to memory of 1816 1504 skyrpe.exe 97 PID 1504 wrote to memory of 1816 1504 skyrpe.exe 97 PID 1504 wrote to memory of 1816 1504 skyrpe.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe"C:\Users\Admin\AppData\Local\Temp\4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe"C:\Users\Admin\AppData\Local\Temp\4c6384b33c02a8124545a6356d71c1d12e45d369e796d669da75238051c37c71.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IXYWE.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Skype" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe" /f4⤵
- Adds Run key to start application
PID:1904
-
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"C:\Users\Admin\AppData\Roaming\skype\skyrpe.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:1816
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD50654f004b2e314bad7f75867e91da37d
SHA14232c22e7340b12108d86e3cb35ed288a3dbc7f1
SHA256ead325a060300a9606a3f0f14694be39a3e4006a60c6c3eb0bea5d6f98192249
SHA512dda135cdfca90a742d42b4c7a5e7f5df6580ec428302a8f0c311f5b92eb08dda75774e0c7497110faffbe2dfa02b30d2dfe35ec2848a275f53be8d930c7aa553
-
Filesize
284KB
MD54f287bf4d5182a58e23ca89cbf102083
SHA146d77121869c2a69834e31528b2f08e234d751a2
SHA256b9012cd30a3f4e50d7bd701284f29312f9786ed182ae5c1277f2702a38483fa8
SHA51263387718a647055aa076a6e22384c4529409d27d0c2185f75749265bcf165d138a7c9e3fde436cde8b467b1dfea6849b8e1436df88db8a0c2c07f5c95c2f066d
-
Filesize
284KB
MD54f287bf4d5182a58e23ca89cbf102083
SHA146d77121869c2a69834e31528b2f08e234d751a2
SHA256b9012cd30a3f4e50d7bd701284f29312f9786ed182ae5c1277f2702a38483fa8
SHA51263387718a647055aa076a6e22384c4529409d27d0c2185f75749265bcf165d138a7c9e3fde436cde8b467b1dfea6849b8e1436df88db8a0c2c07f5c95c2f066d
-
Filesize
284KB
MD54f287bf4d5182a58e23ca89cbf102083
SHA146d77121869c2a69834e31528b2f08e234d751a2
SHA256b9012cd30a3f4e50d7bd701284f29312f9786ed182ae5c1277f2702a38483fa8
SHA51263387718a647055aa076a6e22384c4529409d27d0c2185f75749265bcf165d138a7c9e3fde436cde8b467b1dfea6849b8e1436df88db8a0c2c07f5c95c2f066d
-
Filesize
284KB
MD54f287bf4d5182a58e23ca89cbf102083
SHA146d77121869c2a69834e31528b2f08e234d751a2
SHA256b9012cd30a3f4e50d7bd701284f29312f9786ed182ae5c1277f2702a38483fa8
SHA51263387718a647055aa076a6e22384c4529409d27d0c2185f75749265bcf165d138a7c9e3fde436cde8b467b1dfea6849b8e1436df88db8a0c2c07f5c95c2f066d