Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe
Resource
win10v2004-20220812-en
General
-
Target
17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe
-
Size
278KB
-
MD5
d0967914b98789b8c5a033e2e6a9a1f8
-
SHA1
bd6226241265548bacac3a288e654a2b52acf31b
-
SHA256
17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641
-
SHA512
e97a9ea92864bc9cc9795b665a13be3862916a786de316801759c26ad85c78d3d053b8b7c3bfec201039f474d0471873cd6a11e3dd074fa35734951eb3d3db50
-
SSDEEP
6144:dQDds6bxOU8ytpJP/+HFLNSFpEBax8CqRZ:SDG6b98yJYNJax8Cq
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uugbgiyxh.exe RegSvcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uugbgiyxh.exe\DisableExceptionChainValidation RegSvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\random = "\"C:\\ProgramData\\randomfolder\\uugbgiyxh.exe\"" 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\avast! Antivirus RegSvcs.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe File opened for modification C:\Windows\assembly\Desktop.ini 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe File created C:\ProgramData\randomfolder\desktop.ini RegSvcs.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3208 set thread context of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe File created C:\Windows\assembly\Desktop.ini 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe File opened for modification C:\Windows\assembly\Desktop.ini 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegSvcs.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegSvcs.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RegSvcs.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4916 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{A32C7EBE-DFEA-624B-A41C-54B3B15F83B7}\589C06E0\CG1 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{A32C7EBE-DFEA-624B-A41C-54B3B15F83B7} RegSvcs.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{A32C7EBE-DFEA-624B-A41C-54B3B15F83B7}\589C06E0\CG1\HAL = 05ee0000 RegSvcs.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{A32C7EBE-DFEA-624B-A41C-54B3B15F83B7}\589C06E0\CG1\BID = 200008001d000b00e6070000140000001d00070033001a0000000000feb98563 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{A32C7EBE-DFEA-624B-A41C-54B3B15F83B7}\589C06E0\CS1 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{A32C7EBE-DFEA-624B-A41C-54B3B15F83B7}\589C06E0 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{A32C7EBE-DFEA-624B-A41C-54B3B15F83B7}\589C06E0\CW1 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\CLSID\{A32C7EBE-DFEA-624B-A41C-54B3B15F83B7}\589C06E0\CW1\3208 = 88000000040600008df1be05f6010700 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2260 RegSvcs.exe 2260 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe Token: SeRestorePrivilege 2260 RegSvcs.exe Token: SeBackupPrivilege 2260 RegSvcs.exe Token: SeDebugPrivilege 2260 RegSvcs.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3208 wrote to memory of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 PID 3208 wrote to memory of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 PID 3208 wrote to memory of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 PID 3208 wrote to memory of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 PID 3208 wrote to memory of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 PID 3208 wrote to memory of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 PID 3208 wrote to memory of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 PID 3208 wrote to memory of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 PID 3208 wrote to memory of 2260 3208 17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe 83 PID 2260 wrote to memory of 4916 2260 RegSvcs.exe 84 PID 2260 wrote to memory of 4916 2260 RegSvcs.exe 84 PID 2260 wrote to memory of 4916 2260 RegSvcs.exe 84 PID 2260 wrote to memory of 4816 2260 RegSvcs.exe 86 PID 2260 wrote to memory of 4816 2260 RegSvcs.exe 86 PID 2260 wrote to memory of 4816 2260 RegSvcs.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe"C:\Users\Admin\AppData\Local\Temp\17802b7ea044164f5f89d89ab8c7afd5c3a7a92373dc538688945e6f8e39a641.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Sets file execution options in registry
- Checks for any installed AV software in registry
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x589C06E0" /TR "C:\ProgramData\randomfolder\uugbgiyxh.exe" /RL HIGHEST3⤵
- Creates scheduled task(s)
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\SysWOW64\WerFault.exe"3⤵PID:4816
-
-