Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569.exe
Resource
win10v2004-20220901-en
General
-
Target
dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569.exe
-
Size
2.0MB
-
MD5
19456ff2914eb5b9158348fe63434d60
-
SHA1
568553598105a1b25a9325a2a00b04deb308ad02
-
SHA256
dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569
-
SHA512
a0be8f38d1daa145c05aa2d3872b788d5d1a882f7ff76edce2d85dc832853328f3c5878f5a68df4eed44373111615ec2095577828d23b108c224f74bf723728c
-
SSDEEP
49152:sMMMMMMMMMMMMMMMMMMMMMMMM9MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMX:sMMMMMMMMMMMMMMMMMMMMMMMM9MMMMMX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 hdrviaon.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce hdrviaon.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\C:\Users\Admin\A417ZL~1 = "C:\\Users\\Admin\\A417ZL~1\\zywdmymkef.vbs" hdrviaon.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" RegSvcs.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hdrviaon.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 whatismyipaddress.com 16 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3032 set thread context of 3984 3032 hdrviaon.exe 84 PID 3984 set thread context of 2268 3984 RegSvcs.exe 86 PID 3984 set thread context of 732 3984 RegSvcs.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3032 hdrviaon.exe 3032 hdrviaon.exe 3032 hdrviaon.exe 3032 hdrviaon.exe 3984 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3032 hdrviaon.exe Token: SeDebugPrivilege 3984 RegSvcs.exe Token: SeDebugPrivilege 2268 vbc.exe Token: SeDebugPrivilege 732 vbc.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2532 wrote to memory of 3032 2532 dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569.exe 82 PID 2532 wrote to memory of 3032 2532 dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569.exe 82 PID 2532 wrote to memory of 3032 2532 dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569.exe 82 PID 3032 wrote to memory of 3984 3032 hdrviaon.exe 84 PID 3032 wrote to memory of 3984 3032 hdrviaon.exe 84 PID 3032 wrote to memory of 3984 3032 hdrviaon.exe 84 PID 3032 wrote to memory of 3984 3032 hdrviaon.exe 84 PID 3032 wrote to memory of 3984 3032 hdrviaon.exe 84 PID 3032 wrote to memory of 3984 3032 hdrviaon.exe 84 PID 3032 wrote to memory of 3984 3032 hdrviaon.exe 84 PID 3032 wrote to memory of 3984 3032 hdrviaon.exe 84 PID 3984 wrote to memory of 2268 3984 RegSvcs.exe 86 PID 3984 wrote to memory of 2268 3984 RegSvcs.exe 86 PID 3984 wrote to memory of 2268 3984 RegSvcs.exe 86 PID 3984 wrote to memory of 2268 3984 RegSvcs.exe 86 PID 3984 wrote to memory of 2268 3984 RegSvcs.exe 86 PID 3984 wrote to memory of 2268 3984 RegSvcs.exe 86 PID 3984 wrote to memory of 2268 3984 RegSvcs.exe 86 PID 3984 wrote to memory of 2268 3984 RegSvcs.exe 86 PID 3984 wrote to memory of 2268 3984 RegSvcs.exe 86 PID 3984 wrote to memory of 732 3984 RegSvcs.exe 89 PID 3984 wrote to memory of 732 3984 RegSvcs.exe 89 PID 3984 wrote to memory of 732 3984 RegSvcs.exe 89 PID 3984 wrote to memory of 732 3984 RegSvcs.exe 89 PID 3984 wrote to memory of 732 3984 RegSvcs.exe 89 PID 3984 wrote to memory of 732 3984 RegSvcs.exe 89 PID 3984 wrote to memory of 732 3984 RegSvcs.exe 89 PID 3984 wrote to memory of 732 3984 RegSvcs.exe 89 PID 3984 wrote to memory of 732 3984 RegSvcs.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569.exe"C:\Users\Admin\AppData\Local\Temp\dfcc3b5c46b49cf6bd153cabf2aeff6a9eb6d96e86be96fe79c0d6110b6d8569.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\a417zl1hog92\hdrviaon.exe"C:\Users\Admin\a417zl1hog92\hdrviaon.exe" rlswmcukwb2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"4⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d54aaa35d0288f162333959fd276db22
SHA148bb4f545eef61256e7aabeaa5c1f71a3841b7c9
SHA2563c7c00fd90e050ddc7dd4ae35f92446aee0156c32d1eff0366713b12d21c4dbf
SHA512903029d0d0fc415e566d27b6439b426f4bfe398ce9dae28953b389a8b3333cd2a49701c1b060747bb78e3918966f72249d8c042b8f19915699007ab356f1ded1
-
Filesize
61B
MD59c0ad013cb7be646fe759a99aa878ac6
SHA13902baa49dcb8e57ff72e2596e7e9c321520d037
SHA2561a259a7b6596fbecf9416400193c128ddd5a064a17f4837e56080950d4342f4e
SHA512b2d8e1a6151e6f8aaf0bb7031e2a841f949919f2817dda66de740757ceb2bfb643f1816bd2c67d1bc03df3562328afd5283ebd4c339fd2888e3210b57d92b776
-
Filesize
327B
MD51265c5140a2f68b05b92aa1a25a2abb6
SHA1627a660e9d2a41c8c4a662ca44fdb68a1356bc82
SHA256694bae0c1ebf6f8eeb8d902b1bfad57ed9a42dea6d3e327a0137a1c9f4f0c6b9
SHA512ad6a1dd57ec84459f28926d07e25f2c4f49dc67ff95b8400e85c3bcb8eccc471dbac5e2b1a2758fb563866ecacc2fae4657dfb85197fb4cd2547eef334b8a216
-
Filesize
1KB
MD501e7975c708365983265ae40d604beb4
SHA1f1c793c9b7a312d355cd944928ba9272bbeec44e
SHA25695d7aeb5f67dc33d0b62d02b26a5d469436f58f2246fd95189a8b86220bc9a40
SHA5129c67c306fbb0e191ea7af01388c6a99714c353590d99887ddd0b0ceee3f6cd3af2e7b2c8d1d22a5a34dac746e4b2156876d935a658afc9a1d38597fd4922e023
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
Filesize
218.9MB
MD5c76062f5c1a26d97041e052bf97dca80
SHA1d6ba9264753022da401b946be87835075db0ef33
SHA2567f589d02524695a6bd6707b295f98cdbd13fa15766cae240f9f1f9e97143507c
SHA512702855ef303acf56b35382a26c62295a21c2b4f2ec9a664241fbad3edbb9c0f8cff31ebc9a047ead19b3916d83ce50dbb96b73d6ade8e4e2a65fc21481c70acf