Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
14/10/2022, 17:56
221014-wh41hseaal 714/10/2022, 17:48
221014-wdxewadhg3 814/10/2022, 17:34
221014-v5h6wsdhfn 8Analysis
-
max time kernel
179s -
max time network
223s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
langs/Hungarian.ps1
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
langs/Hungarian.ps1
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
langs/Korean.ps1
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
langs/Korean.ps1
Resource
win10v2004-20220901-en
General
-
Target
Setup.exe
-
Size
376.9MB
-
MD5
2f9db86c1f07387ba6b0168d62ed2950
-
SHA1
37ffc85149a8bdb31044c82c775ce329421ff77c
-
SHA256
cfb9b1ded6e26c2ae213126dbe5301394754b076acf7d9b033794c79c4eeb8b2
-
SHA512
9f5a3aa0447e09409306b36b0b41dbafe9e08c0112d0a43e6194c57830b5e023271d66010130b99d58cad8f352006dc63e82567e9697eef35cd6e0fdf526ac35
-
SSDEEP
196608:3IERCPHzGscu98PPz6qC+pTDGwud0AvEO:4ERaHzGEgOqH/GwTEEO
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4264 loader.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2792 schtasks.exe 752 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4112 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3748 Setup.exe 3748 Setup.exe 3748 Setup.exe 4264 loader.exe 4264 loader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3748 Setup.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3748 wrote to memory of 4264 3748 Setup.exe 81 PID 3748 wrote to memory of 4264 3748 Setup.exe 81 PID 3748 wrote to memory of 4264 3748 Setup.exe 81 PID 3748 wrote to memory of 4480 3748 Setup.exe 82 PID 3748 wrote to memory of 4480 3748 Setup.exe 82 PID 3748 wrote to memory of 4480 3748 Setup.exe 82 PID 4480 wrote to memory of 4112 4480 cmd.exe 84 PID 4480 wrote to memory of 4112 4480 cmd.exe 84 PID 4480 wrote to memory of 4112 4480 cmd.exe 84 PID 4264 wrote to memory of 2792 4264 loader.exe 86 PID 4264 wrote to memory of 2792 4264 loader.exe 86 PID 4264 wrote to memory of 2792 4264 loader.exe 86 PID 4264 wrote to memory of 4508 4264 loader.exe 88 PID 4264 wrote to memory of 4508 4264 loader.exe 88 PID 4264 wrote to memory of 4508 4264 loader.exe 88 PID 4264 wrote to memory of 752 4264 loader.exe 90 PID 4264 wrote to memory of 752 4264 loader.exe 90 PID 4264 wrote to memory of 752 4264 loader.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Roaming\loader.exe"C:\Users\Admin\AppData\Roaming\loader.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"3⤵
- Creates scheduled task(s)
PID:2792
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Event Viewer Snap-in Launcher (29762912)"3⤵PID:4508
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "Event Viewer Snap-in Launcher (29762912)" /XML "C:\Users\Admin\AppData\Roaming\EventViewer\tfnme73946158264.tmp"3⤵
- Creates scheduled task(s)
PID:752
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 5 & del "C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:4112
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eaa9508409753304d9e037737ec0eb39
SHA1a2ca75395db967b387489ad976993c3550584f91
SHA25643e7717146acc35b6be7749c43f4027c2890eb0d826247176f7d21bbeb3bfb0a
SHA51295ab48a818446885178777dd3991fc9a1735d9d004bcacfab9285d323267633251724f22a297f976f71b6d5ef008f0dc43397e5796cc872eba74fadaa3581bcf
-
Filesize
6.5MB
MD5430a004b31279218ef515045ae189418
SHA1c9f2ca0ea0d6b33f174df5a2fead8ab66a20eb40
SHA2566f60d8b2eb23625afab673a733c6515232528636e991e2c3c5f6ee707e75adc4
SHA5124eeae06b5ea352d98f928ff79a02465dcd35600ac47fbd8b64dbaa22785ab132f9f112600b9fb51d44c073176fe2fb84acab4e9e3d63465d5d1f6024da787ddd
-
Filesize
6.5MB
MD5430a004b31279218ef515045ae189418
SHA1c9f2ca0ea0d6b33f174df5a2fead8ab66a20eb40
SHA2566f60d8b2eb23625afab673a733c6515232528636e991e2c3c5f6ee707e75adc4
SHA5124eeae06b5ea352d98f928ff79a02465dcd35600ac47fbd8b64dbaa22785ab132f9f112600b9fb51d44c073176fe2fb84acab4e9e3d63465d5d1f6024da787ddd