Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe
Resource
win10v2004-20220901-en
General
-
Target
e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe
-
Size
569KB
-
MD5
7fd9af1c1a854f847f2ffe95458dcfd9
-
SHA1
7c8b78682ab85ee6a2e2800485d6889560490cc7
-
SHA256
e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d
-
SHA512
c53eeacad56a512bdc55f92a463b6d8f5858cdd900027b5ef250b9af64e1f36ec91f888d74dbd0245058cea7dc646e6c074315d3f71ad4eaefda8c7fd5c180d6
-
SSDEEP
12288:f3nZMhJ+ubN8pqZP9keT9hbdotzjnzrrm837L+R/4YjunOL0vyqqaw:f3nZqfb+pqZVkeT9hbmzPmHtvun8ww
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 1340 wina.exe 2300 Tibia.exe 4376 svghost.exe 1732 updater.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Tibia.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wina.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\svghost.exe svghost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\svghost.exe svghost.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync Tibia.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Tibia.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Tibia.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Tibia.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OTSERV\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Tibia.exe %1" Tibia.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{B699A1C8-A7A0-4FBE-AD1E-74E078C3A81B} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OTSERV\ = "URL:Open Tibia Server" Tibia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\OTSERV\EditFlags = "2" Tibia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OTSERV\shell\open\command Tibia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OTSERV\shell Tibia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OTSERV\shell\open Tibia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OTSERV Tibia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OTSERV\Source Filter Tibia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OTSERV\URL Protocol Tibia.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2300 Tibia.exe 2300 Tibia.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2300 Tibia.exe Token: SeDebugPrivilege 1732 updater.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2300 Tibia.exe 2300 Tibia.exe 3776 OpenWith.exe 3792 OpenWith.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1340 1516 e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe 82 PID 1516 wrote to memory of 1340 1516 e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe 82 PID 1516 wrote to memory of 1340 1516 e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe 82 PID 1516 wrote to memory of 2300 1516 e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe 84 PID 1516 wrote to memory of 2300 1516 e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe 84 PID 1340 wrote to memory of 4376 1340 wina.exe 85 PID 1340 wrote to memory of 4376 1340 wina.exe 85 PID 1340 wrote to memory of 4376 1340 wina.exe 85 PID 2300 wrote to memory of 1732 2300 Tibia.exe 91 PID 2300 wrote to memory of 1732 2300 Tibia.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe"C:\Users\Admin\AppData\Local\Temp\e33f409856880d6d18e9d0e02f6afa7d8d486b46540afa3408283234bc9ae65d.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\wina.exe"C:\Users\Admin\AppData\Local\Temp\wina.exe" -papapa2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\svghost.exe"C:\Users\Admin\AppData\Local\Temp\svghost.exe"3⤵
- Executes dropped EXE
- Drops startup file
PID:4376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Tibia.exe"C:\Users\Admin\AppData\Local\Temp\Tibia.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\updater.exe"C:\Users\Admin\AppData\Local\Temp\updater.exe" 0;0;1104;23003⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:1520
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3776
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:4232
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
343KB
MD54ff5f5486f49137cf5919acf6dd6a99b
SHA1aa3b3c6ba4e3ae5f064c41224a5f13ab19196eab
SHA256f7814fd9fa75c0468cd16ffe356a24c352b5539897e3789c09d5139a8bf3d8d1
SHA512b246886aa1aaa3f18171f8d0d91de655673228cbc1ae63415b4da611e8db0b8e8f93e8c63e0c0f80768e0fef6b330d8fa7136737a1f52066f2f2f8a5a2ef2522
-
Filesize
343KB
MD54ff5f5486f49137cf5919acf6dd6a99b
SHA1aa3b3c6ba4e3ae5f064c41224a5f13ab19196eab
SHA256f7814fd9fa75c0468cd16ffe356a24c352b5539897e3789c09d5139a8bf3d8d1
SHA512b246886aa1aaa3f18171f8d0d91de655673228cbc1ae63415b4da611e8db0b8e8f93e8c63e0c0f80768e0fef6b330d8fa7136737a1f52066f2f2f8a5a2ef2522
-
Filesize
501KB
MD5a252c588ae7c5ef6c86be590c86a9c8e
SHA1232bfa074deeea0d1435e42abbf5b57e75eb7e12
SHA2561ff274c6278f14fd8baf282c148f3ee22a0de50810bd1f74a8163a5b2b927983
SHA512619f40c7d5f985574c46d43d83f50d3d6e64dcba048812f9c3e32d52a4afd37d60524ef921b9cea9c4109ef904300fb1a776fe1239a2fadac26fdc712406371e
-
Filesize
501KB
MD5a252c588ae7c5ef6c86be590c86a9c8e
SHA1232bfa074deeea0d1435e42abbf5b57e75eb7e12
SHA2561ff274c6278f14fd8baf282c148f3ee22a0de50810bd1f74a8163a5b2b927983
SHA512619f40c7d5f985574c46d43d83f50d3d6e64dcba048812f9c3e32d52a4afd37d60524ef921b9cea9c4109ef904300fb1a776fe1239a2fadac26fdc712406371e
-
Filesize
88KB
MD5b2424fda6bec648a48263784e27722de
SHA14fb66ac21edd9b3243c36ce2f2c32cb7270e007b
SHA256ba0d15bec9e42159c9675eabea6a8ef068906fb324b6716f54345a87f81a1731
SHA5128b86f8c9b372b94c66185ffd94ca2e5ad66be576afba2327814a10fd131bd1e38f4bab92459570023328264b9faf687292e04ff37e25ef2d3d76b09fac8bee30
-
Filesize
88KB
MD5b2424fda6bec648a48263784e27722de
SHA14fb66ac21edd9b3243c36ce2f2c32cb7270e007b
SHA256ba0d15bec9e42159c9675eabea6a8ef068906fb324b6716f54345a87f81a1731
SHA5128b86f8c9b372b94c66185ffd94ca2e5ad66be576afba2327814a10fd131bd1e38f4bab92459570023328264b9faf687292e04ff37e25ef2d3d76b09fac8bee30
-
Filesize
220KB
MD5dc693b8d851d7474685d27767e9944d2
SHA16858885841bd97337984f0179fd0e7437a39db97
SHA2560f69b4596c396fe700e33eb19900f718e65cb3e449f9c9e5f04d63067359107d
SHA512afb93f3bd6e8b30e4c22868381295325c239dbc830191f389f7c31df1fefade599b78cd4cf44cbc099500bd73fc2343fac7ae1a4469e7510fc0fa59d6ce52ad7
-
Filesize
220KB
MD5dc693b8d851d7474685d27767e9944d2
SHA16858885841bd97337984f0179fd0e7437a39db97
SHA2560f69b4596c396fe700e33eb19900f718e65cb3e449f9c9e5f04d63067359107d
SHA512afb93f3bd6e8b30e4c22868381295325c239dbc830191f389f7c31df1fefade599b78cd4cf44cbc099500bd73fc2343fac7ae1a4469e7510fc0fa59d6ce52ad7