Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/10/2022, 17:56

221014-wh41hseaal 7

14/10/2022, 17:48

221014-wdxewadhg3 8

14/10/2022, 17:34

221014-v5h6wsdhfn 8

Analysis

  • max time kernel
    123s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2022, 17:48

General

  • Target

    Setup.exe

  • Size

    376.9MB

  • MD5

    2f9db86c1f07387ba6b0168d62ed2950

  • SHA1

    37ffc85149a8bdb31044c82c775ce329421ff77c

  • SHA256

    cfb9b1ded6e26c2ae213126dbe5301394754b076acf7d9b033794c79c4eeb8b2

  • SHA512

    9f5a3aa0447e09409306b36b0b41dbafe9e08c0112d0a43e6194c57830b5e023271d66010130b99d58cad8f352006dc63e82567e9697eef35cd6e0fdf526ac35

  • SSDEEP

    196608:3IERCPHzGscu98PPz6qC+pTDGwud0AvEO:4ERaHzGEgOqH/GwTEEO

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Checks computer location settings
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Roaming\load.exe
      "C:\Users\Admin\AppData\Roaming\load.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell "" "Get-WmiObject Win32_PortConnector"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2440
    • C:\Users\Admin\AppData\Roaming\loader.exe
      "C:\Users\Admin\AppData\Roaming\loader.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4608
      • C:\Windows\SysWOW64\schtasks.exe
        /C /Query /XML /TN "Event Viewer Snap-in Launcher (29762912)"
        3⤵
          PID:4136
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /tn "Event Viewer Snap-in Launcher (29762912)" /XML "C:\Users\Admin\AppData\Roaming\EventViewer\tfnme73946158264.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:424
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C timeout 5 & del "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:220
        • C:\Windows\SysWOW64\timeout.exe
          timeout 5
          3⤵
          • Delays execution with timeout.exe
          PID:1572

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\EventViewer\tfnme73946158264.tmp

      Filesize

      1KB

      MD5

      dc403e5ef9a6354d431e2d171c64403a

      SHA1

      7cc7aa92368f76df262f17e0a8f37938b3a4c4e7

      SHA256

      4226eb6768bf7ece35de8c4a6c1034dc1b224df86648e3787a721e40b227d8f1

      SHA512

      7fc3bdf75a273b4924ee93080c5c439bfa2380b9561d96eef517cf79a496d92abeb48da928ab3d8037fbfd70219cab38be8531c9eb010e08ba92071e61c89fe4

    • C:\Users\Admin\AppData\Roaming\load.exe

      Filesize

      5.1MB

      MD5

      f8b36732d78a98dd4c356e2c9146a1ed

      SHA1

      408b97952ec19ede77d21b543ad459e3c5da6275

      SHA256

      23804023beb7c6abf4012b119231ad9ed4fc2cbf1a7acccee91776465d6d4990

      SHA512

      091f232b859f06f6572992031c4194287b3de2357058e323d56c79baa5a6699dd63a0887dab1c8367b1bb8a8ebbe6d0cdd68092b8e4e165bf4aeb2b0ec735dbb

    • C:\Users\Admin\AppData\Roaming\load.exe

      Filesize

      5.1MB

      MD5

      f8b36732d78a98dd4c356e2c9146a1ed

      SHA1

      408b97952ec19ede77d21b543ad459e3c5da6275

      SHA256

      23804023beb7c6abf4012b119231ad9ed4fc2cbf1a7acccee91776465d6d4990

      SHA512

      091f232b859f06f6572992031c4194287b3de2357058e323d56c79baa5a6699dd63a0887dab1c8367b1bb8a8ebbe6d0cdd68092b8e4e165bf4aeb2b0ec735dbb

    • C:\Users\Admin\AppData\Roaming\loader.exe

      Filesize

      6.5MB

      MD5

      430a004b31279218ef515045ae189418

      SHA1

      c9f2ca0ea0d6b33f174df5a2fead8ab66a20eb40

      SHA256

      6f60d8b2eb23625afab673a733c6515232528636e991e2c3c5f6ee707e75adc4

      SHA512

      4eeae06b5ea352d98f928ff79a02465dcd35600ac47fbd8b64dbaa22785ab132f9f112600b9fb51d44c073176fe2fb84acab4e9e3d63465d5d1f6024da787ddd

    • C:\Users\Admin\AppData\Roaming\loader.exe

      Filesize

      6.5MB

      MD5

      430a004b31279218ef515045ae189418

      SHA1

      c9f2ca0ea0d6b33f174df5a2fead8ab66a20eb40

      SHA256

      6f60d8b2eb23625afab673a733c6515232528636e991e2c3c5f6ee707e75adc4

      SHA512

      4eeae06b5ea352d98f928ff79a02465dcd35600ac47fbd8b64dbaa22785ab132f9f112600b9fb51d44c073176fe2fb84acab4e9e3d63465d5d1f6024da787ddd

    • memory/1208-143-0x0000000074590000-0x0000000074B41000-memory.dmp

      Filesize

      5.7MB

    • memory/1208-133-0x0000000074590000-0x0000000074B41000-memory.dmp

      Filesize

      5.7MB

    • memory/1208-132-0x00000000008D0000-0x0000000001407000-memory.dmp

      Filesize

      11.2MB

    • memory/1208-142-0x00000000008D0000-0x0000000001407000-memory.dmp

      Filesize

      11.2MB

    • memory/2136-145-0x0000000000960000-0x000000000132F000-memory.dmp

      Filesize

      9.8MB

    • memory/2136-150-0x0000000000960000-0x000000000132F000-memory.dmp

      Filesize

      9.8MB

    • memory/2440-153-0x0000023873560000-0x0000023873582000-memory.dmp

      Filesize

      136KB

    • memory/2440-154-0x00007FFE93480000-0x00007FFE93F41000-memory.dmp

      Filesize

      10.8MB

    • memory/2440-155-0x00007FFE93480000-0x00007FFE93F41000-memory.dmp

      Filesize

      10.8MB

    • memory/2880-151-0x00000000002D0000-0x0000000001593000-memory.dmp

      Filesize

      18.8MB

    • memory/2880-138-0x00000000002D0000-0x0000000001593000-memory.dmp

      Filesize

      18.8MB

    • memory/2880-156-0x00000000002D0000-0x0000000001593000-memory.dmp

      Filesize

      18.8MB