Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/10/2022, 17:56

221014-wh41hseaal 7

14/10/2022, 17:48

221014-wdxewadhg3 8

14/10/2022, 17:34

221014-v5h6wsdhfn 8

Analysis

  • max time kernel
    179s
  • max time network
    223s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2022, 17:34

General

  • Target

    Setup.exe

  • Size

    376.9MB

  • MD5

    2f9db86c1f07387ba6b0168d62ed2950

  • SHA1

    37ffc85149a8bdb31044c82c775ce329421ff77c

  • SHA256

    cfb9b1ded6e26c2ae213126dbe5301394754b076acf7d9b033794c79c4eeb8b2

  • SHA512

    9f5a3aa0447e09409306b36b0b41dbafe9e08c0112d0a43e6194c57830b5e023271d66010130b99d58cad8f352006dc63e82567e9697eef35cd6e0fdf526ac35

  • SSDEEP

    196608:3IERCPHzGscu98PPz6qC+pTDGwud0AvEO:4ERaHzGEgOqH/GwTEEO

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Checks computer location settings
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Users\Admin\AppData\Roaming\loader.exe
      "C:\Users\Admin\AppData\Roaming\loader.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4264
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2792
      • C:\Windows\SysWOW64\schtasks.exe
        /C /Query /XML /TN "Event Viewer Snap-in Launcher (29762912)"
        3⤵
          PID:4508
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /tn "Event Viewer Snap-in Launcher (29762912)" /XML "C:\Users\Admin\AppData\Roaming\EventViewer\tfnme73946158264.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:752
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C timeout 5 & del "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4480
        • C:\Windows\SysWOW64\timeout.exe
          timeout 5
          3⤵
          • Delays execution with timeout.exe
          PID:4112

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\EventViewer\tfnme73946158264.tmp

      Filesize

      1KB

      MD5

      eaa9508409753304d9e037737ec0eb39

      SHA1

      a2ca75395db967b387489ad976993c3550584f91

      SHA256

      43e7717146acc35b6be7749c43f4027c2890eb0d826247176f7d21bbeb3bfb0a

      SHA512

      95ab48a818446885178777dd3991fc9a1735d9d004bcacfab9285d323267633251724f22a297f976f71b6d5ef008f0dc43397e5796cc872eba74fadaa3581bcf

    • C:\Users\Admin\AppData\Roaming\loader.exe

      Filesize

      6.5MB

      MD5

      430a004b31279218ef515045ae189418

      SHA1

      c9f2ca0ea0d6b33f174df5a2fead8ab66a20eb40

      SHA256

      6f60d8b2eb23625afab673a733c6515232528636e991e2c3c5f6ee707e75adc4

      SHA512

      4eeae06b5ea352d98f928ff79a02465dcd35600ac47fbd8b64dbaa22785ab132f9f112600b9fb51d44c073176fe2fb84acab4e9e3d63465d5d1f6024da787ddd

    • C:\Users\Admin\AppData\Roaming\loader.exe

      Filesize

      6.5MB

      MD5

      430a004b31279218ef515045ae189418

      SHA1

      c9f2ca0ea0d6b33f174df5a2fead8ab66a20eb40

      SHA256

      6f60d8b2eb23625afab673a733c6515232528636e991e2c3c5f6ee707e75adc4

      SHA512

      4eeae06b5ea352d98f928ff79a02465dcd35600ac47fbd8b64dbaa22785ab132f9f112600b9fb51d44c073176fe2fb84acab4e9e3d63465d5d1f6024da787ddd

    • memory/3748-133-0x0000000000570000-0x00000000010A7000-memory.dmp

      Filesize

      11.2MB

    • memory/3748-134-0x0000000074560000-0x0000000074B11000-memory.dmp

      Filesize

      5.7MB

    • memory/3748-135-0x0000000074560000-0x0000000074B11000-memory.dmp

      Filesize

      5.7MB

    • memory/3748-132-0x0000000000570000-0x00000000010A7000-memory.dmp

      Filesize

      11.2MB

    • memory/3748-141-0x0000000000570000-0x00000000010A7000-memory.dmp

      Filesize

      11.2MB

    • memory/3748-142-0x0000000074560000-0x0000000074B11000-memory.dmp

      Filesize

      5.7MB

    • memory/4264-144-0x0000000000950000-0x000000000131F000-memory.dmp

      Filesize

      9.8MB

    • memory/4264-143-0x0000000000950000-0x000000000131F000-memory.dmp

      Filesize

      9.8MB

    • memory/4264-149-0x0000000000950000-0x000000000131F000-memory.dmp

      Filesize

      9.8MB

    • memory/4264-150-0x0000000000950000-0x000000000131F000-memory.dmp

      Filesize

      9.8MB