Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    177s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 06:29

General

  • Target

    b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe

  • Size

    201KB

  • MD5

    b1839f3b0f0e4038d1fd83c983be0d84

  • SHA1

    2bf1f11aa6ea2d3c143b96429af67732422045b7

  • SHA256

    b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01

  • SHA512

    a38615b638277c03228bf2ab4cc62501cae9733c8ef0b26997b1aebc14b460004a0475e98767e95874a1784f8bbfda4da4b620966b6994128862f3ca72d91735

  • SSDEEP

    3072:jvqz89m+363/7AbwLYtcFkTS3WqNbuXJ7RqhqzPdeplhkB7wAKLu0A9JsZKjtU89:r3TSFNiNsqoplhKEu0Wswj2eMs

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe
    "C:\Users\Admin\AppData\Local\Temp\b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\AppData\Local\Temp\b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe
      "C:\Users\Admin\AppData\Local\Temp\b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe" C:\Users\Admin\AppData\Local\Temp\b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3568
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:216
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\b9fe9161b2b5701a16b846dd89dbe839e98cf7adc96f5041bbd3edd404a81b01.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1196
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:2840
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3884
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3884 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:5052
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3884 CREDAT:82952 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3328
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3884 CREDAT:17420 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2728

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Adobe\acrotray .exe

      Filesize

      233KB

      MD5

      d91b8faaa33d666121e532a7ef7d44d8

      SHA1

      1a8765fac937de74d0ed79fdb7b99f92b18e0717

      SHA256

      d7bcfd3598a5fb0edc186e7c79fb71ff43bad50e079e4268ad64806a200847e0

      SHA512

      7fce2858983d0792e0f7a694fbb3509d53d0cad2ca39e365802070b37c978da7647f482b4b7eb166686ccf17501080f202bce16b8681dfcad762bc6cd6881efd

    • C:\Program Files (x86)\Adobe\acrotray .exe

      Filesize

      233KB

      MD5

      d91b8faaa33d666121e532a7ef7d44d8

      SHA1

      1a8765fac937de74d0ed79fdb7b99f92b18e0717

      SHA256

      d7bcfd3598a5fb0edc186e7c79fb71ff43bad50e079e4268ad64806a200847e0

      SHA512

      7fce2858983d0792e0f7a694fbb3509d53d0cad2ca39e365802070b37c978da7647f482b4b7eb166686ccf17501080f202bce16b8681dfcad762bc6cd6881efd

    • C:\Program Files (x86)\Adobe\acrotray .exe

      Filesize

      233KB

      MD5

      d91b8faaa33d666121e532a7ef7d44d8

      SHA1

      1a8765fac937de74d0ed79fdb7b99f92b18e0717

      SHA256

      d7bcfd3598a5fb0edc186e7c79fb71ff43bad50e079e4268ad64806a200847e0

      SHA512

      7fce2858983d0792e0f7a694fbb3509d53d0cad2ca39e365802070b37c978da7647f482b4b7eb166686ccf17501080f202bce16b8681dfcad762bc6cd6881efd

    • C:\Program Files (x86)\Adobe\acrotray.exe

      Filesize

      203KB

      MD5

      3a1ed478afdb3b2029c6a8ced04e6958

      SHA1

      4288d3cc28fef5995c3fb4072e6221d7b5e0b698

      SHA256

      643bd15f90571c2858a5b7f74a871cb9163425cd7ef42776b38fbaaa2c809981

      SHA512

      81d45d087c5a9b7bd5ff1605ff026f4440f86a9d9a1030621f384a5ece08bb05a34ed1890b6d92c491fd9db5d43baf4a7de5f1274d108dba104fd9d7b75a833c

    • C:\Program Files (x86)\Adobe\acrotray.exe

      Filesize

      203KB

      MD5

      3a1ed478afdb3b2029c6a8ced04e6958

      SHA1

      4288d3cc28fef5995c3fb4072e6221d7b5e0b698

      SHA256

      643bd15f90571c2858a5b7f74a871cb9163425cd7ef42776b38fbaaa2c809981

      SHA512

      81d45d087c5a9b7bd5ff1605ff026f4440f86a9d9a1030621f384a5ece08bb05a34ed1890b6d92c491fd9db5d43baf4a7de5f1274d108dba104fd9d7b75a833c

    • C:\Program Files (x86)\Adobe\acrotray.exe

      Filesize

      203KB

      MD5

      3a1ed478afdb3b2029c6a8ced04e6958

      SHA1

      4288d3cc28fef5995c3fb4072e6221d7b5e0b698

      SHA256

      643bd15f90571c2858a5b7f74a871cb9163425cd7ef42776b38fbaaa2c809981

      SHA512

      81d45d087c5a9b7bd5ff1605ff026f4440f86a9d9a1030621f384a5ece08bb05a34ed1890b6d92c491fd9db5d43baf4a7de5f1274d108dba104fd9d7b75a833c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0684275E946EA5A526A0B9446D8D1B31_8BC55A34553CE38DA9A256FD39734BE9

      Filesize

      1KB

      MD5

      ef0a5356109e7bbe89316d30b1704102

      SHA1

      c03110d8b0660d80bcf5b30732ff548af793f0fb

      SHA256

      ddc49b9f1b3a236cef1a6affc184b9140af764819904e92e18b3f88612deb16d

      SHA512

      e787e4ebedc00078925da48016099bc4eaedf0daf8f5871916cabaf1f25a78b4d791dfd628b397d7ff59d02f70fe89247805d4a6796e7e2562f0984ecc664e29

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      1KB

      MD5

      e564cab61e382406f4d7e9ebdca3f2ca

      SHA1

      68f896027033333b22ce4479fbe87e3a13ff79df

      SHA256

      9b67206021b63e35a55fe2b95b9263fd514099f4e4bd0e3fef0f4a33d1c69028

      SHA512

      6ed16f0eeea4c054b21f187dab5dbed13109ba9355700fa7a0e57c5823300aac2e9acd00455b2adb4ab2d81cb96f05082ac2cd23877be5894e2c51408bd45fc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      28b32aa5ff3510390e757a05e43f3b95

      SHA1

      ec807cc921ef696297c7783aa463bbdea3b9d696

      SHA256

      3482ea10aa62bb911999d06d1f8f875103e97140d691a6b7b202349f9674b0d7

      SHA512

      78b598cd8e59ef5f038482576a8746233d66d592ea579691a88d53a38f4baaea7b7e4c8fb2f31ca8d496788e1d1a32fd936adf7a323220e41c1f758f852a9d20

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4

      Filesize

      472B

      MD5

      5006b8e985c5838b7fd2f2b558a65bc4

      SHA1

      183ff15e0faedf346305fd6fe1c70c9c7a1eef4a

      SHA256

      fcbfec9f5fd0e10d44778c1df64d8612281cd39881cdfd0aa8ca30d13655655a

      SHA512

      56526aaf34500a94404e83461b3580513be1f07b288485c7059fc1ec86b77cda50da613b7def2fe6a8e2d04bb3d522fdffb5f7e9293eab06e86cd2d6af24a1a7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_7E301575BABDCBC6D3C3B91BC6B458AD

      Filesize

      471B

      MD5

      342da2c33af109ac503ef72014789071

      SHA1

      9f9ce9e9c713ba3ebf8d2c2339b9ec2fa506567a

      SHA256

      beade5b410ce931a244db18222f0228e501d4c517a29a1af6e316f6c2fc340a7

      SHA512

      a743f374f1ace6ea6dfd7450cd5ccd6d7bd4d2e9a098932aff6105786a3b5e96647bce9a5029e2265517930478b41d96e261fd3cd9e7b4575605e679065101e9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      724B

      MD5

      f569e1d183b84e8078dc456192127536

      SHA1

      30c537463eed902925300dd07a87d820a713753f

      SHA256

      287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

      SHA512

      49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0684275E946EA5A526A0B9446D8D1B31_8BC55A34553CE38DA9A256FD39734BE9

      Filesize

      458B

      MD5

      6d3fd22b1c9a114f649c71b430af5064

      SHA1

      0a3ba5e7d6c394b4340bc57f057816bdcf5185f7

      SHA256

      ecc24508ee4c39ffa48b64bb93dc42249181ed1880e25bc12287c2c4f905c695

      SHA512

      03e6b3fbc4748c4f97e202b0d895b192311d60d42cc1b9873dce325c4f8ea3e5b39e971c58e49ae91db7ed6d822e9be15388b74afb7cf890465d6a31d77176c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

      Filesize

      450B

      MD5

      ab89b3027f2155a8c89813c5281781c9

      SHA1

      1b8aaec80446e98573975eb1f35af817f0fbf5e2

      SHA256

      c0909093063dc402962142955d1a4ca0678be7ca37e32807961f625b7d4ae0ed

      SHA512

      1c76d7bf483da5e01ccf98a9a39cd833b498b8c9a1703528c177f1afc8ce9030a4e9dd3050e1235600d29f1fd0255baf1cd33c3769824e62f8aa868145464f1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      b14b2e026aee07d9c1807a2389d1012a

      SHA1

      e5c7d50c54eda34a2068f3b82e29bed6d795340f

      SHA256

      b6275775adcfaff780d304f4ab007d75a57bbf9ac64ccf47499f8cb9beedf18b

      SHA512

      313535fdc5b985270552e6aa31d1269e1f17032efdd0b2a7b8c8f1e2046914d01e83b285b8eb0fad40ee2ac3e126dd2f65c93795abd0131f9bcebd1414d6c5a0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4

      Filesize

      402B

      MD5

      82ec3c0f8347777121b61caaf768c341

      SHA1

      cf74deb1696845f5a70ac9d6b0564738f74532a4

      SHA256

      55d780167e0a3a7ab4d7670aa03a4bbf421327e14e67ae8c3eb70e5ac2e3bb40

      SHA512

      be166ac6485ee549b6b5cecfd7133978317b03f840bedcb314cb08d784601a9cb1b4c5244d4b0e0233801b5ffa2e49372066eb23aa147f6c22879014b17f5818

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_7E301575BABDCBC6D3C3B91BC6B458AD

      Filesize

      406B

      MD5

      3cca07ced8ef332d7a6e1241fd08613c

      SHA1

      bcfaa11d715ac80c244f2c7c0b1b737f2d6eae92

      SHA256

      fdf313e82ab6784ee136ed03073a2c7731ab55d002f19d4f6fa4b6e5bfc7fd05

      SHA512

      d50dde4f16aef5fd5043ce50bbff7ed32173066beb88c07e1781c00310e0257c4f91261f2fb7480f9ae5608bceb7919ba361db05284b87d4114fd919b5ca4976

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      392B

      MD5

      4abc5854cc10abfd61bf32d454de518b

      SHA1

      9d12afbdb355a2bb20c2684367010ebe8bcae7d0

      SHA256

      3338521459e3f761886120286492744cc7321790bad4217302b0ecc0003f4f6d

      SHA512

      0704bcc8fd0c7efe0e473129bd5ca5f4be0aa372deb261ed4a306aa1012a0996663a8fd1d4e25f945fd3bd7c623cc14a2e1c6628585f4b87689220ea59b3e1ca

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G9LDH5FK\2.5940ae1c.chunk[1].js

      Filesize

      418KB

      MD5

      04bb6e8d9135d976f28e9ba68fbc6f67

      SHA1

      fe386efd5e23414c48e37d3dbfe340f1ae5d4d4a

      SHA256

      b81d40ef3e5928c7bee6ec287ecebfea17f6d62b277916f0b70d223fa4881d18

      SHA512

      aa21f0744d9e6d286506e425af6f1ea091ebcbe3c671fe339d5c3c18e541323cada2182fae79e3c910aabf4d225142b2bd8458b890322e07f4f9084cf686fbd5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G9LDH5FK\main.4e219663.chunk[1].js

      Filesize

      273KB

      MD5

      87b518e8e45487e774f8d47f2dc0026f

      SHA1

      e5da4365a7867737da9b39ef021cf9f35d12cc5b

      SHA256

      1ef669d1914ecf9299396df700b34839c61c6bb24297dc6b4284820eb5f2e5d9

      SHA512

      7b8b1c87c0eb5ab34d515df4880b88dcc5bf7c6b5089349bcf05cd2bb82a0152ba7ebd21fa45fabbc460076543e7e563f881234d3b1dbe66188e98d01a8c7d4f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GMQ6XNBF\caf[2].js

      Filesize

      143KB

      MD5

      087fa8b05a1bbf548117c0e33ac77baf

      SHA1

      be02e7989299c68f5ffc11841c0de8fc2e6e024d

      SHA256

      e69512ecc3e2daec343f481cdbf617163f62cb9bc31a38bd8ff08ceff6e52df4

      SHA512

      e979b03e9e54920971f11b84643742c068570a3ca61c15a7f6cea567a30cbbb7a31f44adf5a52cfa6cf10cc492cbcc8060fe314d4d992533136ef8c80cd0cea7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GMQ6XNBF\chevron[1].svg

      Filesize

      200B

      MD5

      11b3089d616633ca6b73b57aa877eeb4

      SHA1

      07632f63e06b30d9b63c97177d3a8122629bda9b

      SHA256

      809fb4619d2a2f1a85dbda8cc69a7f1659215212d708a098d62150eee57070c1

      SHA512

      079b0e35b479dfdbe64a987661000f4a034b10688e26f2a5fe6aaa807e81ccc5593d40609b731ab3340e687d83dd08de4b8b1e01cdac9d4523a9f6bb3acfcba0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GMQ6XNBF\search[1].svg

      Filesize

      391B

      MD5

      a6ad6e65373db8c1b1f154c4c83f8ce5

      SHA1

      84cc007d6d682c589e1e1f87482a5278830f3000

      SHA256

      920a378947204498c122722933b3a4b67788a2b6fade8bd0d47cf830eeee0563

      SHA512

      09b6d4711c284b1a04c9c4d874f3d1ddfc876c1491fb2aa283a13505bcdbfe90b02731d0b7ad5f492b1dda2161a4afe20040801ea634d2727cde84319adfb1d2

    • memory/1176-132-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB