Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
1.0MB
-
MD5
da04d6b7b1499842ee15fd06f0753a7b
-
SHA1
51ab26f7074d2836ea4e1c3b9f0a9e8eb6b57929
-
SHA256
1046455f39dbe56dc8cc160ebc53b5b32315021af4a871c06235a5257e02f123
-
SHA512
6023ed14d7abdbcd734050ba46162024fd7b39eddad5973e7bdf5de7b1bdc233822c1a4f6027b99f3cebafeb46a41c5fdc82c693beaaa335065316cfdb382852
-
SSDEEP
12288:NyqF7UsDy+vMCt3kzBXDanOmitbih4Lb/aUIYfa7N2NZiuEQDFFAQSQy4At:NJF0UD3kNTcJhmzPZWwAtQy4A
Malware Config
Extracted
formbook
s8gw
b/iFndOEL2rKvw==
HK7quAepCJH6CkNgpH2cDYx1
YEayMA+cR1WQ0Qw/lQ==
kPVNVkAC6pEPHVFQnzCxsA==
yLE1wrE7kf1KRGRm5a95qQ==
D6ktQZWoaOJGopmOlg==
98rmMok6y5e47YvCCMQNPaqM6qf+7PsEAQ==
7Po3fdN1NNtop0X5Ryv9PnUrSLQ=
+vk1DU92V465rf1+gFhdWMFoAsAY
AuhZ6jw45aHmPdzGVilx
/9ln8smKekiYzqePkA==
7+gsdtTlpqcSL0/GVilx
6pXLEOumjAfvK8Y=
inT5kfC0FBmcw/hw7NYua819
wb/qKZCjfrEiKFz9Vyn9chrZxA==
Pil1K4a6ruUXJ2fPD5qXo+2pNMn5VdCREA==
mxo3/mBm1hMSWd8=
8ltzwIsdiPpJXbK30JecDYx1
BmrK2y9G+VyimqzrK9YtmYY=
jPP9Q/IqWt3JQSZtvqI1jb9oAsAY
xWzxa9GO6uM2f8ZremM=
81ZOUHEixtUIVv6NlIycDYx1
x3TwA2aHOqP09Rlz967tvg==
YcGkK4ptotZo
rRGPhtHpxhA5vg1ye2E=
s0nEUS76+DG4N0jCxIuMCH5s
sww09+l42RMSWd8=
nxSyL4EzoozGUpBZhw==
uyCPelMDq3XHVZFL
vctY16I47LsuQmtZV/z7PBzNzA==
E2OPZ4qidzKSyJNN
D6dFPTDUg8kaLmUmd0ldWMJoAsAY
Hfxr+EtmR3rHVZFL
GHz5DGiEOpXU1RopdxGnqQ==
vkyMO5bIjgF3jazpQxN7rCkLjaWsutEg
yCa7yRAQa3bHVZFL
IKm4cOp321WOog==
I3XZ+15s2tImMUjGVilx
x/Jd3b8EpiJXqemg4rgrchrZxA==
4mC1PjLusl2XzqePkA==
tYbmbDzOglrJ4zt2u61ws56J3tPwebg=
DuxD/09nTPBbkjfcIAAIB3QpxWbK3rA=
HHuuqojxl4TAA5Jf
C17m7sNUuc5hra6AeHQ=
vgw+g9qBRjWM3Ik7mA==
GGODX7tmIuDHVZFL
KH6t4TE6FtX+T+PT05shjfFoAsAY
nwWYlWch9TA3hqlW
bXb0fcySIOTHVZFL
aPlXnvfBsGj7O5hRUSQnGI4=
Zpznw5MtmI3HVZFL
19Zg6zNnTPgWPmPM0qicDYx1
kgAZh+ZmxRMSWd8=
f2gI+k/SivxGUIFve1MFSHUrSLQ=
IShqS5bKxWbWFU6N5rNJPRG+W5SWLQ==
67fiJ39totZo
0+kxCeKnjAfvK8Y=
xJoBjOzyVM4zNDhpwpcuchrZxA==
oIoetRFMRHP1M2jDwZmcDYx1
J3OgdY4S7Sg=
fBJLDHKdTs5VZHdiWTH9RXUrSLQ=
kHi1PIBtotZo
cFOqg9WHL2rKvw==
wi6VpX8DXHHHVZFL
aeneontrue.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2060 set thread context of 4608 2060 tmp.exe 93 PID 4608 set thread context of 1124 4608 tmp.exe 28 PID 4328 set thread context of 1124 4328 NETSTAT.EXE 28 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4328 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2060 tmp.exe 2060 tmp.exe 4608 tmp.exe 4608 tmp.exe 4608 tmp.exe 4608 tmp.exe 4608 tmp.exe 4608 tmp.exe 4608 tmp.exe 4608 tmp.exe 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE 4328 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4608 tmp.exe 4608 tmp.exe 4608 tmp.exe 4328 NETSTAT.EXE 4328 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2060 tmp.exe Token: SeDebugPrivilege 4608 tmp.exe Token: SeShutdownPrivilege 1124 Explorer.EXE Token: SeCreatePagefilePrivilege 1124 Explorer.EXE Token: SeDebugPrivilege 4328 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1452 2060 tmp.exe 92 PID 2060 wrote to memory of 1452 2060 tmp.exe 92 PID 2060 wrote to memory of 1452 2060 tmp.exe 92 PID 2060 wrote to memory of 4608 2060 tmp.exe 93 PID 2060 wrote to memory of 4608 2060 tmp.exe 93 PID 2060 wrote to memory of 4608 2060 tmp.exe 93 PID 2060 wrote to memory of 4608 2060 tmp.exe 93 PID 2060 wrote to memory of 4608 2060 tmp.exe 93 PID 2060 wrote to memory of 4608 2060 tmp.exe 93 PID 1124 wrote to memory of 4328 1124 Explorer.EXE 94 PID 1124 wrote to memory of 4328 1124 Explorer.EXE 94 PID 1124 wrote to memory of 4328 1124 Explorer.EXE 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4328
-