Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 15:41
Behavioral task
behavioral1
Sample
aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe
Resource
win10v2004-20220812-en
General
-
Target
aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe
-
Size
171KB
-
MD5
3f2ecc1e1dad23071f38cd08fb7c6d9c
-
SHA1
c62331533faf93ebc441ddb1b0731697fbdf8bd4
-
SHA256
aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84
-
SHA512
3ee4a4d81476e753e6f8b722ec24ac22d7a248e335861bf83a299e47ab003ba73c62a95ce8c8d1bcc09526721a2866b5ca5d00612f00e7962cd84c6df8c122d8
-
SSDEEP
3072:YK91ur/c9FB2LJRdBgocrOSiFAbx6XnoeAhgJkRdwsEKJohRRiK6:b91uTcMLHdOoeHGndAh0sEKJSRRit
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1860 40842F3893C.exe 1220 40842F3893C.exe 1956 UMa38E2.exe -
resource yara_rule behavioral2/memory/4668-132-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/4168-136-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/4168-138-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/4668-139-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/4168-141-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/4168-140-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/files/0x0003000000000735-146.dat upx behavioral2/files/0x0003000000000735-147.dat upx behavioral2/files/0x0003000000000735-152.dat upx behavioral2/memory/1860-155-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/1220-160-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/1220-165-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral2/memory/4168-222-0x0000000000400000-0x0000000000462000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN UMa38E2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZD6J0B3C8F2Z1F8VBOQBGNXVWUY = "C:\\g4fweq23.Bi\\40842F3893C.exe /q" UMa38E2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4668 set thread context of 4168 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 80 PID 1860 set thread context of 1220 1860 40842F3893C.exe 82 -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\PhishingFilter UMa38E2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" UMa38E2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" UMa38E2.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" UMa38E2.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery UMa38E2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 1220 40842F3893C.exe 1220 40842F3893C.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe 1956 UMa38E2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe Token: SeDebugPrivilege 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe Token: SeDebugPrivilege 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe Token: SeDebugPrivilege 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe Token: SeDebugPrivilege 1220 40842F3893C.exe Token: SeDebugPrivilege 1220 40842F3893C.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe Token: SeDebugPrivilege 1956 UMa38E2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 1860 40842F3893C.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4168 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 80 PID 4668 wrote to memory of 4168 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 80 PID 4668 wrote to memory of 4168 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 80 PID 4668 wrote to memory of 4168 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 80 PID 4668 wrote to memory of 4168 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 80 PID 4668 wrote to memory of 4168 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 80 PID 4668 wrote to memory of 4168 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 80 PID 4668 wrote to memory of 4168 4668 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 80 PID 4168 wrote to memory of 1860 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 81 PID 4168 wrote to memory of 1860 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 81 PID 4168 wrote to memory of 1860 4168 aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe 81 PID 1860 wrote to memory of 1220 1860 40842F3893C.exe 82 PID 1860 wrote to memory of 1220 1860 40842F3893C.exe 82 PID 1860 wrote to memory of 1220 1860 40842F3893C.exe 82 PID 1860 wrote to memory of 1220 1860 40842F3893C.exe 82 PID 1860 wrote to memory of 1220 1860 40842F3893C.exe 82 PID 1860 wrote to memory of 1220 1860 40842F3893C.exe 82 PID 1860 wrote to memory of 1220 1860 40842F3893C.exe 82 PID 1860 wrote to memory of 1220 1860 40842F3893C.exe 82 PID 1220 wrote to memory of 1956 1220 40842F3893C.exe 83 PID 1220 wrote to memory of 1956 1220 40842F3893C.exe 83 PID 1220 wrote to memory of 1956 1220 40842F3893C.exe 83 PID 1220 wrote to memory of 1956 1220 40842F3893C.exe 83 PID 1220 wrote to memory of 1956 1220 40842F3893C.exe 83 PID 1956 wrote to memory of 4168 1956 UMa38E2.exe 80 PID 1956 wrote to memory of 4168 1956 UMa38E2.exe 80 PID 1956 wrote to memory of 4168 1956 UMa38E2.exe 80 PID 1956 wrote to memory of 4168 1956 UMa38E2.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe"C:\Users\Admin\AppData\Local\Temp\aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe"C:\Users\Admin\AppData\Local\Temp\aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\g4fweq23.Bi\40842F3893C.exe"C:\g4fweq23.Bi\40842F3893C.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\g4fweq23.Bi\40842F3893C.exe"C:\g4fweq23.Bi\40842F3893C.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\UMa38E2.exe"C:\Users\Admin\AppData\Local\Temp\UMa38E2.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
171KB
MD53f2ecc1e1dad23071f38cd08fb7c6d9c
SHA1c62331533faf93ebc441ddb1b0731697fbdf8bd4
SHA256aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84
SHA5123ee4a4d81476e753e6f8b722ec24ac22d7a248e335861bf83a299e47ab003ba73c62a95ce8c8d1bcc09526721a2866b5ca5d00612f00e7962cd84c6df8c122d8
-
Filesize
171KB
MD53f2ecc1e1dad23071f38cd08fb7c6d9c
SHA1c62331533faf93ebc441ddb1b0731697fbdf8bd4
SHA256aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84
SHA5123ee4a4d81476e753e6f8b722ec24ac22d7a248e335861bf83a299e47ab003ba73c62a95ce8c8d1bcc09526721a2866b5ca5d00612f00e7962cd84c6df8c122d8
-
Filesize
171KB
MD53f2ecc1e1dad23071f38cd08fb7c6d9c
SHA1c62331533faf93ebc441ddb1b0731697fbdf8bd4
SHA256aaad45b3a001009d5f840ad16aaf9027cf4bd7241057e630fe0a34702f719c84
SHA5123ee4a4d81476e753e6f8b722ec24ac22d7a248e335861bf83a299e47ab003ba73c62a95ce8c8d1bcc09526721a2866b5ca5d00612f00e7962cd84c6df8c122d8
-
Filesize
13KB
MD51658a9dd3ba8a8f002c56b3b8a544fd4
SHA19d4c844c6d27fe674e59dd511b1eb38ac2695087
SHA256c83936ac73ca4d8f504a03e25a9c13275d54ca659b81952763f094c162839293
SHA512d3aa33059309a271b130a7b447cad7f62ff418ec5bb631c760189a7f2f4a254510f3b8e13d167e411e9d978051e9fe238e92c3f32ba6608ec2a79de09485b892