Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6.exe
Resource
win10v2004-20220812-en
General
-
Target
483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6.exe
-
Size
45KB
-
MD5
834dd73b37cf6ad1f852c4df68f55f19
-
SHA1
b1edf104fa0df296fc25224bf88610ece6deb245
-
SHA256
483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6
-
SHA512
4e6a09089700ee2d7071a0a674241a1b96438f0a544696a77364c0dfcdac9f707e2a674f1c7755954eca15a03dd87fe77ed7543877b456630553b9f208a32215
-
SSDEEP
768:NUmTIj8ycl8s598HIAQvI9Dq3U6+frYxKwkWyMRy7FFesX8gmU7AwXEPz7vNGOST:RSS/G9UPz7pS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5012 Microsoft Support.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1428 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cdc10baf8d526aadd954bf3f60e0e69e.exe Microsoft Support.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cdc10baf8d526aadd954bf3f60e0e69e.exe Microsoft Support.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cdc10baf8d526aadd954bf3f60e0e69e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft Support.exe\" .." Microsoft Support.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cdc10baf8d526aadd954bf3f60e0e69e = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft Support.exe\" .." Microsoft Support.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe 5012 Microsoft Support.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5012 Microsoft Support.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5100 wrote to memory of 5012 5100 483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6.exe 81 PID 5100 wrote to memory of 5012 5100 483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6.exe 81 PID 5100 wrote to memory of 5012 5100 483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6.exe 81 PID 5012 wrote to memory of 1428 5012 Microsoft Support.exe 82 PID 5012 wrote to memory of 1428 5012 Microsoft Support.exe 82 PID 5012 wrote to memory of 1428 5012 Microsoft Support.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6.exe"C:\Users\Admin\AppData\Local\Temp\483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Support.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Support.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Microsoft Support.exe" "Microsoft Support.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1428
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5834dd73b37cf6ad1f852c4df68f55f19
SHA1b1edf104fa0df296fc25224bf88610ece6deb245
SHA256483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6
SHA5124e6a09089700ee2d7071a0a674241a1b96438f0a544696a77364c0dfcdac9f707e2a674f1c7755954eca15a03dd87fe77ed7543877b456630553b9f208a32215
-
Filesize
45KB
MD5834dd73b37cf6ad1f852c4df68f55f19
SHA1b1edf104fa0df296fc25224bf88610ece6deb245
SHA256483b8f2acfb6031a755b36f15612afb3b7c2810710086ca37ba7a1f7ae1f13b6
SHA5124e6a09089700ee2d7071a0a674241a1b96438f0a544696a77364c0dfcdac9f707e2a674f1c7755954eca15a03dd87fe77ed7543877b456630553b9f208a32215