Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe
Resource
win10v2004-20221111-en
General
-
Target
235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe
-
Size
171KB
-
MD5
230965f195f0df7df0022b6060c873e0
-
SHA1
05c9f75559ab4c856a8a9f36ce9ab7989c304297
-
SHA256
235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df
-
SHA512
b71fbb4b779cf64d9ebdab85e1aef17060cb0c91e781e13eca269231ca14277c8b8f4cb5b6c69b35973c08cb891064071536f4734577cf7033b32f8637bc22fb
-
SSDEEP
3072:7sI+CkiTP3YdoOUgVI5pzPEm15hKJlgpJsyIBGmYYyEl:0CkiTP3dOUgVezPlThbMNEEl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 536 Numamn.exe 1548 Numamn.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Numamn = "C:\\Users\\Admin\\AppData\\Roaming\\Numamn.exe" 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3964 set thread context of 1924 3964 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 82 PID 536 set thread context of 1548 536 Numamn.exe 84 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2695984382" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375803699" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30997936" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2695984382" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AE355B0C-69A3-11ED-919F-628A2E7D3C83} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30997936" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1924 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 1924 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1548 Numamn.exe Token: SeDebugPrivilege 1524 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4596 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4596 IEXPLORE.EXE 4596 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE 1524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3964 wrote to memory of 1924 3964 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 82 PID 3964 wrote to memory of 1924 3964 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 82 PID 3964 wrote to memory of 1924 3964 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 82 PID 3964 wrote to memory of 1924 3964 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 82 PID 3964 wrote to memory of 1924 3964 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 82 PID 3964 wrote to memory of 1924 3964 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 82 PID 3964 wrote to memory of 1924 3964 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 82 PID 3964 wrote to memory of 1924 3964 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 82 PID 1924 wrote to memory of 536 1924 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 83 PID 1924 wrote to memory of 536 1924 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 83 PID 1924 wrote to memory of 536 1924 235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe 83 PID 536 wrote to memory of 1548 536 Numamn.exe 84 PID 536 wrote to memory of 1548 536 Numamn.exe 84 PID 536 wrote to memory of 1548 536 Numamn.exe 84 PID 536 wrote to memory of 1548 536 Numamn.exe 84 PID 536 wrote to memory of 1548 536 Numamn.exe 84 PID 536 wrote to memory of 1548 536 Numamn.exe 84 PID 536 wrote to memory of 1548 536 Numamn.exe 84 PID 536 wrote to memory of 1548 536 Numamn.exe 84 PID 1548 wrote to memory of 3076 1548 Numamn.exe 85 PID 1548 wrote to memory of 3076 1548 Numamn.exe 85 PID 1548 wrote to memory of 3076 1548 Numamn.exe 85 PID 3076 wrote to memory of 4596 3076 iexplore.exe 86 PID 3076 wrote to memory of 4596 3076 iexplore.exe 86 PID 4596 wrote to memory of 1524 4596 IEXPLORE.EXE 87 PID 4596 wrote to memory of 1524 4596 IEXPLORE.EXE 87 PID 4596 wrote to memory of 1524 4596 IEXPLORE.EXE 87 PID 1548 wrote to memory of 1524 1548 Numamn.exe 87 PID 1548 wrote to memory of 1524 1548 Numamn.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe"C:\Users\Admin\AppData\Local\Temp\235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exeC:\Users\Admin\AppData\Local\Temp\235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\Numamn.exe"C:\Users\Admin\AppData\Roaming\Numamn.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Roaming\Numamn.exeC:\Users\Admin\AppData\Roaming\Numamn.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4596 CREDAT:17410 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD5230965f195f0df7df0022b6060c873e0
SHA105c9f75559ab4c856a8a9f36ce9ab7989c304297
SHA256235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df
SHA512b71fbb4b779cf64d9ebdab85e1aef17060cb0c91e781e13eca269231ca14277c8b8f4cb5b6c69b35973c08cb891064071536f4734577cf7033b32f8637bc22fb
-
Filesize
171KB
MD5230965f195f0df7df0022b6060c873e0
SHA105c9f75559ab4c856a8a9f36ce9ab7989c304297
SHA256235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df
SHA512b71fbb4b779cf64d9ebdab85e1aef17060cb0c91e781e13eca269231ca14277c8b8f4cb5b6c69b35973c08cb891064071536f4734577cf7033b32f8637bc22fb
-
Filesize
171KB
MD5230965f195f0df7df0022b6060c873e0
SHA105c9f75559ab4c856a8a9f36ce9ab7989c304297
SHA256235f6a7c6fa4211a8e5be84a6527d6bbdd7ef383ac5fdde0865c81212735c7df
SHA512b71fbb4b779cf64d9ebdab85e1aef17060cb0c91e781e13eca269231ca14277c8b8f4cb5b6c69b35973c08cb891064071536f4734577cf7033b32f8637bc22fb