Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
payload.exe
Resource
win7-20220812-en
General
-
Target
payload.exe
-
Size
185KB
-
MD5
14382242e215d139c77c0ee9bb0c7ad6
-
SHA1
3951322a28787e4757fd3715d518103d6c054960
-
SHA256
5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
-
SHA512
1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
SSDEEP
3072:yXoVNpuuK+ArjKxjCpZomp/04AkJmHrwF8gUdSl5xCZqnr/xA3unPu:bfp5SZow/04tUuUdeSqri3gu
Malware Config
Extracted
formbook
knnt
65SBubRb0cQTZyel+RrmtuIytWG7hIY=
lxY8gZLYuXPYl40/
IBCcbQLOUkWVL3cA/DkK2ei+vuKlXA==
4Lo6dar405m4hxqWl58sOc0=
4KyQBqNrzYWTI6Iv016m7BZVvuKlXA==
PyCmasPI0Lj0JTU=
hnoGNwDmybXus0PVH2S1Td2l0ZTJ
s4CRDagqgmaCo9bOBD4i
T5IbS3G46ZbN8RncbsWuAiWl0ZTJ
2vxQ/T6e+7vkjz9yriaOpBbO8bYapwAu
55558Jha4dgR7PCZrQ==
O9KAFJVY3c4V1Xi2rEGne4ZMtSY=
ZPih22lkYU3Yl40/
mCc1tbkLsWeH
MpbgOtnQvGu9jQ==
D6uAq4Gdj3UEkzmKkCOIW4BG
A3rp8NpDzp2Q
4WMaDz2Ff26SfX5xEaABgk0WTQ==
G16+qE5AFMf20h0PxfsyLIZMtSY=
az44qCVNL8dm2vG/nuEbI3K46HT5K44=
diAkZlHwTStSRz3wbh9m3G2Cqp+dCXx1rw==
ffC9ra7gsm+GqNfOBD4i
LVly43lAwJWZDHRBWt4=
5BJ9ci3CPideCnkSTOFMpg==
xGB7vLFMsI7TCAT0PuUtqThQ
0rww83cujg54ASg=
LS3WlRMiFxo74XtOS1kgIs8=
aQQRwP6zypOa
Mgrwb8EzoIDe3O2WrQ==
tSYt4jy2GsrheliJecwZMM8=
B+T9SePXvGu9jQ==
s99ZdB8C+c/axH8GOmFKLYB+wLiMCXx1rw==
9IBSZ+gLsWeH
ulV6trz5xnaepjyMUc1Mpg==
zMoShxjqZmHI9/67Uc1Mpg==
Piqq166reVusrOplow==
YuSgq8SEeVGL
s6buaf/aIwUoDQgSTOFMpg==
uXyHvZsjdhZxWeY3
qHCEy7zq79L08yq2Kl47
BVLMnc8unIHe3O2WrQ==
uUpunoQQm42p2/H0PuUtqThQ
SWEN1fdnvXze3O2WrQ==
mnBAOx+fMRJWWew3
Ma56cxfrw4+ddQl/E5xAgk0WTQ==
ZyYt3CV607oJlrmjslmquBLMgDPZJY4=
SNCgtHFSRjyJjCWKIHjSors1rKbQ
BG4fFjJnYVLe3O2WrQ==
UcmZlZjUxsLjhf2KFQxZog==
sUd0sarZ3doFIkEDaqkO4QaFvQ3YWkk7
RfILOwiC27b/hmYnk9Y=
0dIDc6IKiYG7DjE/ROJCACyl0ZTJ
S07smzJDzp2Q
PK6K+Z5q2oOjsAePug==
6hCDO5icoXmJdSis6BBsAhggVA==
TLZ4XVHzZ2DYl40/
55q88eBaDO1N1XCxj8tNQ9Q=
Cs0DeKUawVXLqH2MbLDwQJwk6bLL
31sQzJ2whlviZ/qGuA==
Ac3E9+NirYqpye70PuUtqThQ
0fo+u0n4c1riZ/qGuA==
L/klOSRT65uf
QYrnxccD99zpxNPOBD4i
1F6aSX7wSfcGYnlYfVY7OdA=
sw25502.xyz
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4812 rnmvdfdm.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation payload.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run msdt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PFMLY4E8VR = "C:\\Program Files (x86)\\Q7nddb\\rnmvdfdm.exe" msdt.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5028 set thread context of 2576 5028 payload.exe 31 PID 5040 set thread context of 2576 5040 msdt.exe 31 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Q7nddb\rnmvdfdm.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Q7nddb\rnmvdfdm.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Q7nddb\rnmvdfdm.exe msdt.exe File opened for modification C:\Program Files (x86)\Q7nddb Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5028 payload.exe 5028 payload.exe 5028 payload.exe 5028 payload.exe 5028 payload.exe 5028 payload.exe 5028 payload.exe 5028 payload.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2576 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 5028 payload.exe 5028 payload.exe 5028 payload.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe 5040 msdt.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 5028 payload.exe Token: SeDebugPrivilege 5040 msdt.exe Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeDebugPrivilege 4812 rnmvdfdm.exe Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE Token: SeShutdownPrivilege 2576 Explorer.EXE Token: SeCreatePagefilePrivilege 2576 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2576 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2576 wrote to memory of 5040 2576 Explorer.EXE 82 PID 2576 wrote to memory of 5040 2576 Explorer.EXE 82 PID 2576 wrote to memory of 5040 2576 Explorer.EXE 82 PID 5040 wrote to memory of 1940 5040 msdt.exe 89 PID 5040 wrote to memory of 1940 5040 msdt.exe 89 PID 5040 wrote to memory of 1940 5040 msdt.exe 89 PID 2576 wrote to memory of 4812 2576 Explorer.EXE 91 PID 2576 wrote to memory of 4812 2576 Explorer.EXE 91 PID 2576 wrote to memory of 4812 2576 Explorer.EXE 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\payload.exe"C:\Users\Admin\AppData\Local\Temp\payload.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1940
-
-
-
C:\Program Files (x86)\Q7nddb\rnmvdfdm.exe"C:\Program Files (x86)\Q7nddb\rnmvdfdm.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD514382242e215d139c77c0ee9bb0c7ad6
SHA13951322a28787e4757fd3715d518103d6c054960
SHA2565017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
SHA5121f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
Filesize
185KB
MD514382242e215d139c77c0ee9bb0c7ad6
SHA13951322a28787e4757fd3715d518103d6c054960
SHA2565017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
SHA5121f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b