Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe
Resource
win10v2004-20220901-en
General
-
Target
410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe
-
Size
622KB
-
MD5
14328e88f1ee1398d20fdd3627b34330
-
SHA1
dc51fcf1cc2625e7afe870dce3c8e64d1f3c715b
-
SHA256
410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee
-
SHA512
75ab5d680912170f3b91d258df94c2a2b6ead39feddf8d79469aaff5950041d08e8d9ac261c76dbe7487df2b3240aac945dbf93b13d66aa4364a37dbd9f51ae9
-
SSDEEP
12288:drdaA2wSjF/DNIs2Jvpmhybi/gSKg9SYq/vWtwWjF/pShqpvp1:drdaAojRDzSBmt9SYwO1jRQhaB1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1124 UpdaterService.exe -
Loads dropped DLL 15 IoCs
pid Process 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\SoftwareUpdater\uninstall.exe 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe File created C:\Program Files (x86)\SoftwareUpdater\config.xml 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe File created C:\Program Files (x86)\SoftwareUpdater\KeyGen.dll 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe File opened for modification C:\Program Files (x86)\SoftwareUpdater\AppsUpdaterSem.exe.config 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe File created C:\Program Files (x86)\SoftwareUpdater\AppsUpdater.exe 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe File created C:\Program Files (x86)\SoftwareUpdater\UpdaterService.exe 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe File created C:\Program Files (x86)\SoftwareUpdater\AppsUpdaterSem.exe.config 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe File created C:\Program Files (x86)\SoftwareUpdater\AppsUpdater.exe.config 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe File created C:\Program Files (x86)\SoftwareUpdater\Interop.Shell32.dll 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe File created C:\Program Files (x86)\SoftwareUpdater\translations.xml 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 5080 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5080 taskkill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4568 wrote to memory of 5080 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 83 PID 4568 wrote to memory of 5080 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 83 PID 4568 wrote to memory of 5080 4568 410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe"C:\Users\Admin\AppData\Local\Temp\410d29045eef242a2ceaa7718e41c8c427c68ef2e7bb46652a6e0ccba2471cee.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppsUpdater.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Program Files (x86)\SoftwareUpdater\UpdaterService.exe"C:\Program Files (x86)\SoftwareUpdater\UpdaterService.exe"1⤵
- Executes dropped EXE
PID:1124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5ddd4e882b3ea7973458ed4ccbbf17715
SHA1e75c94a44c03c1897bd28522e9df1b673d078b05
SHA256495a534ce0b72ea2f277239d49f1a501defe3fdb4e93870f5bd5944b026d3563
SHA5120de4918f4c436bdf9bb3f18474768f187c110dddecb555ab88e17682ec1096fa7c5e6789d44e49c1040c0774490ebbcf01082c9c6aa3d0b1129b0b414b3f3440
-
Filesize
39KB
MD5ddd4e882b3ea7973458ed4ccbbf17715
SHA1e75c94a44c03c1897bd28522e9df1b673d078b05
SHA256495a534ce0b72ea2f277239d49f1a501defe3fdb4e93870f5bd5944b026d3563
SHA5120de4918f4c436bdf9bb3f18474768f187c110dddecb555ab88e17682ec1096fa7c5e6789d44e49c1040c0774490ebbcf01082c9c6aa3d0b1129b0b414b3f3440
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
110KB
MD56b997e803a10663fa4a2995c030ba1a9
SHA13f81a5fc93601f04a4327ffd7c5a063dbf50a882
SHA2569f50688db497c70cc2c84558dcb71b19d076f983557f2b7de8a742fa804ba060
SHA5124cb8ecc7bb54c9e506e5061b452d474fd077b9f34b89384f54647dffabd77138fc4ad43e3fc14c6a65da21d72f655cf40560d53179a8317bb7b04382ff5bd776
-
Filesize
110KB
MD56b997e803a10663fa4a2995c030ba1a9
SHA13f81a5fc93601f04a4327ffd7c5a063dbf50a882
SHA2569f50688db497c70cc2c84558dcb71b19d076f983557f2b7de8a742fa804ba060
SHA5124cb8ecc7bb54c9e506e5061b452d474fd077b9f34b89384f54647dffabd77138fc4ad43e3fc14c6a65da21d72f655cf40560d53179a8317bb7b04382ff5bd776
-
Filesize
222KB
MD5ea79ad436f5e54ee5dc2aba13fe1b15a
SHA166e248962bfb1f370796dac393621367638c21b1
SHA2560ae09d65f5284409e6d9a2d40d7aaa8cbf1dd1815e67a9c12a9557f5de1f7832
SHA512dbd40403126c6ef6f5747c900809140c8897376f03696247cd8d10431bec7abb0c7191761e8ea551cfde2234059ec087ffbca54510ddf0dc78b8329f598fab2e
-
Filesize
222KB
MD5ea79ad436f5e54ee5dc2aba13fe1b15a
SHA166e248962bfb1f370796dac393621367638c21b1
SHA2560ae09d65f5284409e6d9a2d40d7aaa8cbf1dd1815e67a9c12a9557f5de1f7832
SHA512dbd40403126c6ef6f5747c900809140c8897376f03696247cd8d10431bec7abb0c7191761e8ea551cfde2234059ec087ffbca54510ddf0dc78b8329f598fab2e