Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
416s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe
Resource
win10v2004-20221111-en
General
-
Target
d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe
-
Size
425KB
-
MD5
fe484787661bf09669f845a732270d98
-
SHA1
8f2bc598564fd08b6b6ec6da295938946525afa7
-
SHA256
d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab
-
SHA512
ae854fbb50a8c533796568835f68f3caf258bff8031e5d655c6516c73e3f10afef4016e369ff80d2eb3644f7c8c88918d44b0b4e6425aecdd26b0b849440278b
-
SSDEEP
12288:sSXQpmFaoScAdtr1JGgF9Sv+hD7e9IpYbW9NP7AYN:s4QpmLyfnTPS+hZ/9NP7AYN
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 5052 winlogon.exe 3268 winlogon.exe 4484 csrss.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation winlogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" csrss.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini winlogon.exe File opened for modification C:\Windows\assembly\Desktop.ini winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5052 set thread context of 3268 5052 winlogon.exe 87 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini winlogon.exe File opened for modification C:\Windows\assembly\Desktop.ini winlogon.exe File opened for modification C:\Windows\assembly winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winlogon.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe:ZONE.identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe:ZONE.identifier cmd.exe File created C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\csrss.exe\:ZONE.identifier:$DATA winlogon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 winlogon.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe 4484 csrss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3268 winlogon.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 532 d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5052 winlogon.exe Token: SeDebugPrivilege 3268 winlogon.exe Token: SeDebugPrivilege 4484 csrss.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3268 winlogon.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 532 wrote to memory of 4756 532 d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe 82 PID 532 wrote to memory of 4756 532 d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe 82 PID 532 wrote to memory of 4756 532 d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe 82 PID 532 wrote to memory of 5052 532 d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe 84 PID 532 wrote to memory of 5052 532 d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe 84 PID 532 wrote to memory of 5052 532 d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe 84 PID 5052 wrote to memory of 4644 5052 winlogon.exe 85 PID 5052 wrote to memory of 4644 5052 winlogon.exe 85 PID 5052 wrote to memory of 4644 5052 winlogon.exe 85 PID 5052 wrote to memory of 3268 5052 winlogon.exe 87 PID 5052 wrote to memory of 3268 5052 winlogon.exe 87 PID 5052 wrote to memory of 3268 5052 winlogon.exe 87 PID 5052 wrote to memory of 3268 5052 winlogon.exe 87 PID 5052 wrote to memory of 3268 5052 winlogon.exe 87 PID 5052 wrote to memory of 3268 5052 winlogon.exe 87 PID 5052 wrote to memory of 3268 5052 winlogon.exe 87 PID 5052 wrote to memory of 3268 5052 winlogon.exe 87 PID 5052 wrote to memory of 4484 5052 winlogon.exe 88 PID 5052 wrote to memory of 4484 5052 winlogon.exe 88 PID 5052 wrote to memory of 4484 5052 winlogon.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe"C:\Users\Admin\AppData\Local\Temp\d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe"1⤵
- Checks computer location settings
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe":ZONE.identifier & exit2⤵
- NTFS ADS
PID:4756
-
-
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe":ZONE.identifier & exit3⤵
- NTFS ADS
PID:4644
-
-
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3268
-
-
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\csrss.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\csrss.exe" -keyhide -prochide 3268 -reg C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe -proc 3268 C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab.exe
Filesize425KB
MD5fe484787661bf09669f845a732270d98
SHA18f2bc598564fd08b6b6ec6da295938946525afa7
SHA256d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab
SHA512ae854fbb50a8c533796568835f68f3caf258bff8031e5d655c6516c73e3f10afef4016e369ff80d2eb3644f7c8c88918d44b0b4e6425aecdd26b0b849440278b
-
Filesize
425KB
MD5fe484787661bf09669f845a732270d98
SHA18f2bc598564fd08b6b6ec6da295938946525afa7
SHA256d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab
SHA512ae854fbb50a8c533796568835f68f3caf258bff8031e5d655c6516c73e3f10afef4016e369ff80d2eb3644f7c8c88918d44b0b4e6425aecdd26b0b849440278b
-
Filesize
425KB
MD5fe484787661bf09669f845a732270d98
SHA18f2bc598564fd08b6b6ec6da295938946525afa7
SHA256d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab
SHA512ae854fbb50a8c533796568835f68f3caf258bff8031e5d655c6516c73e3f10afef4016e369ff80d2eb3644f7c8c88918d44b0b4e6425aecdd26b0b849440278b
-
Filesize
425KB
MD5fe484787661bf09669f845a732270d98
SHA18f2bc598564fd08b6b6ec6da295938946525afa7
SHA256d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab
SHA512ae854fbb50a8c533796568835f68f3caf258bff8031e5d655c6516c73e3f10afef4016e369ff80d2eb3644f7c8c88918d44b0b4e6425aecdd26b0b849440278b
-
Filesize
425KB
MD5fe484787661bf09669f845a732270d98
SHA18f2bc598564fd08b6b6ec6da295938946525afa7
SHA256d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab
SHA512ae854fbb50a8c533796568835f68f3caf258bff8031e5d655c6516c73e3f10afef4016e369ff80d2eb3644f7c8c88918d44b0b4e6425aecdd26b0b849440278b
-
Filesize
425KB
MD5fe484787661bf09669f845a732270d98
SHA18f2bc598564fd08b6b6ec6da295938946525afa7
SHA256d1da67579c78d02d319d99e3f989753cfc1d6793984ff70a7d491000111e29ab
SHA512ae854fbb50a8c533796568835f68f3caf258bff8031e5d655c6516c73e3f10afef4016e369ff80d2eb3644f7c8c88918d44b0b4e6425aecdd26b0b849440278b