Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2022, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe
Resource
win7-20220812-en
General
-
Target
fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe
-
Size
225KB
-
MD5
c20af4b2b3bcb4bb82ef4a78818caffa
-
SHA1
ddc2f854e96e649a300c6cba5bc8d57d0af8de58
-
SHA256
fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57
-
SHA512
e53b8819e810d853f2fdf86e129058b096df025bdcf8ec308d8f69b796b911f52f0e1c60431654ac03caf081abdcbef807cb664f6581d6ff61ba9742cf2f33ab
-
SSDEEP
3072:qUJoFfWzzl+cSMY7xIsqoh3vpj+WSuW2x96i6e4coO81ju5qoRNir+QKQqjQgWmA:qweEpGxj9pHHeFwVNr7jzUBWnk/fZ
Malware Config
Extracted
formbook
fqsu
GhfTqaOqC4FsyoQRW/8=
kbPIpd/8k1C6zJz5mYYdK90ZUA==
VIdg/CoNGeYJHA==
KhzoqndOhw1j43z0ew==
wv8mTDcsX2wJN/Q=
MqBgt6S+3BgGKBQHLZy7Ucg=
GyhOb++nZDi39NPK7dbaKapf
pBtD1UoSTdo3eSp9H7OhRqMV0TAuKMU=
WTzTg1w+fP4fMO0oPPM=
NS/tpGdUwkiMwqmgkxoSzjrQATAuKMU=
MnoSdM1hYn4tdwxjB2fX
3EUfH2EJY17mMf4=
V9/wg2yCQruVszm7V+4=
aNL8pZCGYW4Ej2LD
1Bif9VkmdgVfrJqRvl1GtlTZq1M=
9wHIgmB8EOB2uUVcUfk=
1Fdn15qem+fL1qhrY9xdQmAnVg==
Y32ThttYUUr6PsuRmozlNP74RD+uBz7dOQ==
f5HKyoWNAJLM2qjnZlizsvXDKFs=
mRfaGezap6ZyvJqthZvf
XE1gb9BDOSjo
a9OJ2b2kjstszoza
9btSLokhpHEBONENG+A=
1oAKNwX+AlQ4RiqbCKr3/A==
CXyeL6Bef+sHEOohAWbW
LIB9lHUdfinrMPw=
X7dIczoX7/WDk2a0P4P42iAqXA==
1AosTUdOqyZn43z0ew==
w4kh92EUqSnrMPw=
X9mR59TIpqmQ3MRW3dHaKapf
KW8vtcGOicqbG6P1y0bE5w==
vkxt6aqmRoxJWDaaKoHs+c7R2RWuug==
djf3H/3eGlnoHf4=
QcvffHSEZVsaWTg6K5y7Ucg=
/kfWf0w9mxRGn1uybA==
b8lWfUMY2+E9opoOvdTaKapf
4ifWgGxC54S499ZNmE/F5Q==
7AP9JgUOCEUfL/5LmE/F5Q==
42soE+T1jmG3vkVcUfk=
2AssSCkCPo5ji3athZvf
sNMB+T7ij5hvrZLJiX7V
HR01IYJZMBiUzai563i+Z9E=
4Fd9D4pjthkFCt5RmE/F5Q==
6yu5FXMXHiy7zqGthZvf
cO+UduB23nibvKmTiwbzQmAnVg==
vXETR/2rOfRETvrbmE/F5Q==
ic+XHc6whH7sfccPmE/F5Q==
DSc+LHk1A/5szoza
JTFNQgUfvHjj4Kb8os3aKapf
YxDG7ce0Ers3TB1s39HaKapf
j+eurPutWiCeDmathZvf
XQcvovGUtwkHTB519CFlQmAnVg==
1HmuRaRp15cZQQbZ7hFlQmAnVg==
tPmYAWoWGUY6SPhMmE/F5Q==
EFryTMuzz5HJ9OU=
G135x5VKYpuQ43z0ew==
CTnVhWd74nOZ43z0ew==
sJ+03smn9npsyoQRW/8=
JJRan1oWtqJ2vJiNVpWT9KBZ
Qj9Pa11v7KkTUSfp46OeQcZK/W0PZLdr
FjVWTQ8bqinrMPw=
rdVfEergTeAkTAXemE/F5Q==
55jA4cQafSnrMPw=
kIcp2ZZgh9jlEgn7D6KNKHID70AOvlxj
mtvglobalmusic.com
Extracted
xloader
3.8
fqsu
GhfTqaOqC4FsyoQRW/8=
kbPIpd/8k1C6zJz5mYYdK90ZUA==
VIdg/CoNGeYJHA==
KhzoqndOhw1j43z0ew==
wv8mTDcsX2wJN/Q=
MqBgt6S+3BgGKBQHLZy7Ucg=
GyhOb++nZDi39NPK7dbaKapf
pBtD1UoSTdo3eSp9H7OhRqMV0TAuKMU=
WTzTg1w+fP4fMO0oPPM=
NS/tpGdUwkiMwqmgkxoSzjrQATAuKMU=
MnoSdM1hYn4tdwxjB2fX
3EUfH2EJY17mMf4=
V9/wg2yCQruVszm7V+4=
aNL8pZCGYW4Ej2LD
1Bif9VkmdgVfrJqRvl1GtlTZq1M=
9wHIgmB8EOB2uUVcUfk=
1Fdn15qem+fL1qhrY9xdQmAnVg==
Y32ThttYUUr6PsuRmozlNP74RD+uBz7dOQ==
f5HKyoWNAJLM2qjnZlizsvXDKFs=
mRfaGezap6ZyvJqthZvf
XE1gb9BDOSjo
a9OJ2b2kjstszoza
9btSLokhpHEBONENG+A=
1oAKNwX+AlQ4RiqbCKr3/A==
CXyeL6Bef+sHEOohAWbW
LIB9lHUdfinrMPw=
X7dIczoX7/WDk2a0P4P42iAqXA==
1AosTUdOqyZn43z0ew==
w4kh92EUqSnrMPw=
X9mR59TIpqmQ3MRW3dHaKapf
KW8vtcGOicqbG6P1y0bE5w==
vkxt6aqmRoxJWDaaKoHs+c7R2RWuug==
djf3H/3eGlnoHf4=
QcvffHSEZVsaWTg6K5y7Ucg=
/kfWf0w9mxRGn1uybA==
b8lWfUMY2+E9opoOvdTaKapf
4ifWgGxC54S499ZNmE/F5Q==
7AP9JgUOCEUfL/5LmE/F5Q==
42soE+T1jmG3vkVcUfk=
2AssSCkCPo5ji3athZvf
sNMB+T7ij5hvrZLJiX7V
HR01IYJZMBiUzai563i+Z9E=
4Fd9D4pjthkFCt5RmE/F5Q==
6yu5FXMXHiy7zqGthZvf
cO+UduB23nibvKmTiwbzQmAnVg==
vXETR/2rOfRETvrbmE/F5Q==
ic+XHc6whH7sfccPmE/F5Q==
DSc+LHk1A/5szoza
JTFNQgUfvHjj4Kb8os3aKapf
YxDG7ce0Ers3TB1s39HaKapf
j+eurPutWiCeDmathZvf
XQcvovGUtwkHTB519CFlQmAnVg==
1HmuRaRp15cZQQbZ7hFlQmAnVg==
tPmYAWoWGUY6SPhMmE/F5Q==
EFryTMuzz5HJ9OU=
G135x5VKYpuQ43z0ew==
CTnVhWd74nOZ43z0ew==
sJ+03smn9npsyoQRW/8=
JJRan1oWtqJ2vJiNVpWT9KBZ
Qj9Pa11v7KkTUSfp46OeQcZK/W0PZLdr
FjVWTQ8bqinrMPw=
rdVfEergTeAkTAXemE/F5Q==
55jA4cQafSnrMPw=
kIcp2ZZgh9jlEgn7D6KNKHID70AOvlxj
mtvglobalmusic.com
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 560 bquztp.exe 5084 bquztp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation bquztp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 560 set thread context of 5084 560 bquztp.exe 81 PID 5084 set thread context of 2456 5084 bquztp.exe 45 PID 716 set thread context of 2456 716 netsh.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5084 bquztp.exe 5084 bquztp.exe 5084 bquztp.exe 5084 bquztp.exe 5084 bquztp.exe 5084 bquztp.exe 5084 bquztp.exe 5084 bquztp.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2456 Explorer.EXE -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 560 bquztp.exe 5084 bquztp.exe 5084 bquztp.exe 5084 bquztp.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe 716 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5084 bquztp.exe Token: SeDebugPrivilege 716 netsh.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 5040 wrote to memory of 560 5040 fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe 80 PID 5040 wrote to memory of 560 5040 fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe 80 PID 5040 wrote to memory of 560 5040 fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe 80 PID 560 wrote to memory of 5084 560 bquztp.exe 81 PID 560 wrote to memory of 5084 560 bquztp.exe 81 PID 560 wrote to memory of 5084 560 bquztp.exe 81 PID 560 wrote to memory of 5084 560 bquztp.exe 81 PID 2456 wrote to memory of 716 2456 Explorer.EXE 82 PID 2456 wrote to memory of 716 2456 Explorer.EXE 82 PID 2456 wrote to memory of 716 2456 Explorer.EXE 82 PID 716 wrote to memory of 4948 716 netsh.exe 90 PID 716 wrote to memory of 4948 716 netsh.exe 90 PID 716 wrote to memory of 4948 716 netsh.exe 90
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe"C:\Users\Admin\AppData\Local\Temp\fb4fddb4cbdf4cfe8a3c658c6634d4a1d653f9fa61c4ca2ecb069770bf3cae57.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\bquztp.exe"C:\Users\Admin\AppData\Local\Temp\bquztp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\bquztp.exe"C:\Users\Admin\AppData\Local\Temp\bquztp.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:4948
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e31a7d32d2fd851ae1b00ff85dd3a9ca
SHA11e63242b754008bfae79a5ab8e7a2ea45cc2dcd3
SHA256aed72f8afba130aa196db63b1b036450d539c55f3bf9a352df09ce1f9202bddf
SHA512ab51bcfb7d6fe8ff1f62ba030334594c25347eca882348ae1933c7001f841eab24d429704479bb8e343b03e7192506be48a17ece2c999862ee644ec094ced593
-
Filesize
6KB
MD5e31a7d32d2fd851ae1b00ff85dd3a9ca
SHA11e63242b754008bfae79a5ab8e7a2ea45cc2dcd3
SHA256aed72f8afba130aa196db63b1b036450d539c55f3bf9a352df09ce1f9202bddf
SHA512ab51bcfb7d6fe8ff1f62ba030334594c25347eca882348ae1933c7001f841eab24d429704479bb8e343b03e7192506be48a17ece2c999862ee644ec094ced593
-
Filesize
6KB
MD5e31a7d32d2fd851ae1b00ff85dd3a9ca
SHA11e63242b754008bfae79a5ab8e7a2ea45cc2dcd3
SHA256aed72f8afba130aa196db63b1b036450d539c55f3bf9a352df09ce1f9202bddf
SHA512ab51bcfb7d6fe8ff1f62ba030334594c25347eca882348ae1933c7001f841eab24d429704479bb8e343b03e7192506be48a17ece2c999862ee644ec094ced593
-
Filesize
185KB
MD5cfa7847468c5383cd501f8f805e0021a
SHA1f44e223a9af2db99ac56f2f7927fb64949ab1664
SHA25658a415b44850c89beb91dbc1c21c81f8476970ea6226645483f268d68a271cd7
SHA512e4ae5c17d31e45a9dadf72881cd1c42dd8d82095b0068c620b924c90ea328f0e78ddefb3e14f23da28d650bbe273698586327f4cb07dc6098ecd3920eb6e3d98
-
Filesize
5KB
MD5b104c03dbda7dcb8f911d3d48ef3cdc5
SHA124f0c3f064a2fc7fbb945bcb89a4dc3914519ff2
SHA256d9225978ab417360cb9fd791ea653ff49f6b2c4df533d0be078e30eca7b0832f
SHA512a61e358fe6d43c45b7cb0a00d770ff8b9d0696c8b09ef7b1ac42a51ba838b2854b4d61c05ead24dab15041dfdde661f32422da650231c170e2cfc8d325491d66