Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    161s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 06:15

General

  • Target

    1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354.exe

  • Size

    427KB

  • MD5

    9306620146bd6c6fc0b120b4fdd96030

  • SHA1

    f6ac490901ac67c36c0bee01069bb33f3d598cb7

  • SHA256

    1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354

  • SHA512

    aeef77ad6afc1018bcfcfc315e7489cc87cfaf092e0ff3d8bfdc34bb43f4c579adf145f7fd0d429b723f40eabe19ae7e1078aa2fdb998c6b95a12f188b69df12

  • SSDEEP

    1536:Y44SJs5DY6oDAFfdCm3BGwV6bPkxnbNnhd5bsqk6XmChI6HpwKAK:Y41JGY6oUFfdCm1ASJhPNFmF2WK

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 18 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 15 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 25 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354.exe
    "C:\Users\Admin\AppData\Local\Temp\1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\AppData\Local\Temp\1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354.exe
      C:\Users\Admin\AppData\Local\Temp\1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Users\Admin\E696D64614\winlogon.exe
        "C:\Users\Admin\E696D64614\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3184
        • C:\Users\Admin\E696D64614\winlogon.exe
          C:\Users\Admin\E696D64614\winlogon.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Users\Admin\E696D64614\winlogon.exe
            "C:\Users\Admin\E696D64614\winlogon.exe"
            5⤵
            • Modifies firewall policy service
            • Modifies security service
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Windows security bypass
            • Disables RegEdit via registry modification
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Sets file execution options in registry
            • Drops startup file
            • Windows security modification
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Modifies Control Panel
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • System policy modification
            PID:4864
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:408
    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
      1⤵
        PID:4788
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1072
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:17410 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:2312

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        Filesize

        2KB

        MD5

        1a295f69dfd5c6f54042f8bc5b31a6af

        SHA1

        d2b64e2902114ce584f382cbd78b06354b6b14f7

        SHA256

        b14043ac188588e6e6282e515cc581ca0aaae5fbf84a0cf087204bae7fcdad55

        SHA512

        3ed6b02a4b6f723f5ca54e78e2c787e5670cc7bec3e3517e06fdc57afe966fbb62b3702bf6cc6a903fd8ef83ea6f79949018e35b7ca4d93cd3f8e865bc2e724f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        5ddb1febcd291eb59d3d67d24a05bfd0

        SHA1

        fe957affe27cb991f332e7f5c86d3a15359bd3b9

        SHA256

        ec45a385c906b3d925ebbe6532d10adec9a14c1733c756c64db5133bd9d88dcb

        SHA512

        62d00893402fae125ae3428da2495b0eb864b125f975cd887f894f7298a4a86f361cf50aaa7c9b69f3dcb734a950c43472778ea4062b3146c3de5623d08dcd21

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

        Filesize

        1KB

        MD5

        28d104709bf1eb7d9b0f50c9b71f8ffb

        SHA1

        3622e9c08765df6b773b7f9d28819d289ddc5894

        SHA256

        9648713c60ba24ca1550adc7eafcf81438c6e059e63f778d4461fc23044213b3

        SHA512

        175dbcc54a2c013f87bebeced0ee569f9d56e5eeb67c65fb1f0c3ac55fdf9a07251abdbad951d270b635af0031840b48e4521aee7b211f68b18479e75e56a2cc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C67047FE238D580B731A13BEA5F7481F

        Filesize

        472B

        MD5

        2befb6d38d8802be740315b6171c6809

        SHA1

        ec947f39280e50ffe1976280500eed76b66d280d

        SHA256

        e45e24a021be4e6834dd5ee9e992b966fbf9dccf54b15340555ba56d5a3568db

        SHA512

        a5aaa3d0786f0264dde5819bce9da1d7be2f8a68bbab5b422eab6371583008f4f17b080829736dd9cf6a9b07f0514e9fb8d02e83f03b16f480c034a0a451a2f0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

        Filesize

        488B

        MD5

        35c53422cea173c783465286f79026c7

        SHA1

        d8e941db55f7a5befafc83672d0c439ad6600f22

        SHA256

        e6321a3107e2f8dfb7558e14ff45a8f5e8851a8cf102c80d5acf9511728b02f6

        SHA512

        9f723f65e6412950e55ed0d26132c3488e4f15b4092bd288eca47b98b0dba12c389d162c978dc81ba3d55aa2df263eee45a910dbd7a87dfaa91ac4ecf595ddcc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        434B

        MD5

        ef523e21b09f7e7de355b1aff000b197

        SHA1

        06ba7f0d29a97c6afa48c8fec1ee4ef79724a5db

        SHA256

        7b8a5cd5db1edf6795ee751c15d10d9993a7b15bd3eaf39a6e75680a6100eaf7

        SHA512

        3bc8c0d0d65ae112761b4fc96e1c4572a1cd01b42cab5b24e07725355376f2744c1fb425464132c1ef3cb250d4d27b2e5828fb6e91889545c7f8883cda7f58ba

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

        Filesize

        482B

        MD5

        c4411de5a7c6da9588c5058145958a30

        SHA1

        f57cc0ca8e0f2e533cbbc70973df6b3640da20bd

        SHA256

        8dc501c5aee75de3fdb15cb5b2c51211b195add264475f7187c8e7b3f4ab9c01

        SHA512

        e7233932f01ee9b5164e96fdc54886eebe37798816e47550e8e7f0e29436c56d8825d5e586ad1c522b194fc8eaaea74310b221620241ac709a346360afa12129

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C67047FE238D580B731A13BEA5F7481F

        Filesize

        480B

        MD5

        f588a5ab45a987f5d11d5a91ebcdecba

        SHA1

        5dfe7397e3d049d898a5dd7264d26e4e8e200024

        SHA256

        b15b987f59e75146b124fdd256274e36c493c24242b52bf0188c1c873ee3024e

        SHA512

        93f90251cbf332db42b50eb6db656762f6b627efc3a8dac25b1888199cc88228fc40ff58d645d938d0ada3d399243a350641fb498656594e9b0692144c55aaaa

      • C:\Users\Admin\E696D64614\winlogon.exe

        Filesize

        427KB

        MD5

        9306620146bd6c6fc0b120b4fdd96030

        SHA1

        f6ac490901ac67c36c0bee01069bb33f3d598cb7

        SHA256

        1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354

        SHA512

        aeef77ad6afc1018bcfcfc315e7489cc87cfaf092e0ff3d8bfdc34bb43f4c579adf145f7fd0d429b723f40eabe19ae7e1078aa2fdb998c6b95a12f188b69df12

      • C:\Users\Admin\E696D64614\winlogon.exe

        Filesize

        427KB

        MD5

        9306620146bd6c6fc0b120b4fdd96030

        SHA1

        f6ac490901ac67c36c0bee01069bb33f3d598cb7

        SHA256

        1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354

        SHA512

        aeef77ad6afc1018bcfcfc315e7489cc87cfaf092e0ff3d8bfdc34bb43f4c579adf145f7fd0d429b723f40eabe19ae7e1078aa2fdb998c6b95a12f188b69df12

      • C:\Users\Admin\E696D64614\winlogon.exe

        Filesize

        427KB

        MD5

        9306620146bd6c6fc0b120b4fdd96030

        SHA1

        f6ac490901ac67c36c0bee01069bb33f3d598cb7

        SHA256

        1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354

        SHA512

        aeef77ad6afc1018bcfcfc315e7489cc87cfaf092e0ff3d8bfdc34bb43f4c579adf145f7fd0d429b723f40eabe19ae7e1078aa2fdb998c6b95a12f188b69df12

      • C:\Users\Admin\E696D64614\winlogon.exe

        Filesize

        427KB

        MD5

        9306620146bd6c6fc0b120b4fdd96030

        SHA1

        f6ac490901ac67c36c0bee01069bb33f3d598cb7

        SHA256

        1d76f93140ab02b606738bf6a2c93d234e9807d2b471f0f8e61c4217e6a47354

        SHA512

        aeef77ad6afc1018bcfcfc315e7489cc87cfaf092e0ff3d8bfdc34bb43f4c579adf145f7fd0d429b723f40eabe19ae7e1078aa2fdb998c6b95a12f188b69df12

      • memory/436-152-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/436-168-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/1464-143-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/1464-139-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/1464-136-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/1464-135-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/1464-133-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/4864-158-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4864-157-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4864-154-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4864-167-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/4864-169-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB