Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    167s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 08:22

General

  • Target

    98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e.exe

  • Size

    1.3MB

  • MD5

    e582f585925a0c0ece797528d8b33563

  • SHA1

    38d311dfe68ca22d313813068dbc6575b7acc37d

  • SHA256

    98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

  • SHA512

    d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

  • SSDEEP

    6144:JhPpcFVVvD+5FzFcxvqwXoW2z9hreaqFoS:TOCwXoWGjeJFoS

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 10 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e.exe
    "C:\Users\Admin\AppData\Local\Temp\98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NlMeH.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Google Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe" /f
        3⤵
        • Adds Run key to start application
        PID:4444
    • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe
      "C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3432
      • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe
        "C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3664
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TDSoN.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4384
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java Jre" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe" /f
            5⤵
            • Adds Run key to start application
            PID:4812
        • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
          "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4972
          • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
            C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:912
            • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
              C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1888
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3676
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                  8⤵
                  • Modifies firewall policy service
                  • Modifies registry key
                  PID:4564
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe:*:Enabled:Windows Messanger" /f
                7⤵
                  PID:2584
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe:*:Enabled:Windows Messanger" /f
                    8⤵
                    • Modifies firewall policy service
                    • Modifies registry key
                    PID:3376
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\BSSS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\BSSS.exe:*:Enabled:Windows Messanger" /f
                  7⤵
                    PID:3804
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\BSSS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\BSSS.exe:*:Enabled:Windows Messanger" /f
                      8⤵
                      • Modifies firewall policy service
                      • Modifies registry key
                      PID:4800
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                    7⤵
                      PID:4884
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                        8⤵
                        • Modifies firewall policy service
                        • Modifies registry key
                        PID:484
            • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe
              "C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2672

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\NlMeH.bat

          Filesize

          150B

          MD5

          915ab87507342e253384bb621a094633

          SHA1

          6f01afa24f7e97d6b342a6b58e19a8cc789c36d4

          SHA256

          75883add5d1a7227a0a81b9c8c9ead49058cf4d5552fded282676f60380fb879

          SHA512

          99563d862f86a7657b63cae6318f0e3fc341361a117afe789e8f4b9fb1381ca32a4434f015143dbd4d7255682478d49d2d5fbcb84532849f8129d0adeec1cb4c

        • C:\Users\Admin\AppData\Local\Temp\TDSoN.bat

          Filesize

          143B

          MD5

          5da4061354327275e21c2779391cc464

          SHA1

          3d66a2c5a7804d0455366841aa94aeed1dfdb74c

          SHA256

          c2246607ef5f757ac113e4fbdeb18dd16f1618874f7a99f2ed34088462e340c8

          SHA512

          766e57f0dbba4716763286bd9301851cffc76764d9722540762e63ebd5ad1a8a55168d43980f72bcba56b4eee0c5845ed3a931b8ed63dc829946a50204688102

        • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe

          Filesize

          1.3MB

          MD5

          e582f585925a0c0ece797528d8b33563

          SHA1

          38d311dfe68ca22d313813068dbc6575b7acc37d

          SHA256

          98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

          SHA512

          d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

        • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe

          Filesize

          1.3MB

          MD5

          e582f585925a0c0ece797528d8b33563

          SHA1

          38d311dfe68ca22d313813068dbc6575b7acc37d

          SHA256

          98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

          SHA512

          d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

        • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe

          Filesize

          1.3MB

          MD5

          e582f585925a0c0ece797528d8b33563

          SHA1

          38d311dfe68ca22d313813068dbc6575b7acc37d

          SHA256

          98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

          SHA512

          d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

        • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe

          Filesize

          1.3MB

          MD5

          e582f585925a0c0ece797528d8b33563

          SHA1

          38d311dfe68ca22d313813068dbc6575b7acc37d

          SHA256

          98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

          SHA512

          d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

        • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

          Filesize

          1.3MB

          MD5

          e582f585925a0c0ece797528d8b33563

          SHA1

          38d311dfe68ca22d313813068dbc6575b7acc37d

          SHA256

          98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

          SHA512

          d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

        • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

          Filesize

          1.3MB

          MD5

          e582f585925a0c0ece797528d8b33563

          SHA1

          38d311dfe68ca22d313813068dbc6575b7acc37d

          SHA256

          98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

          SHA512

          d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

        • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

          Filesize

          1.3MB

          MD5

          e582f585925a0c0ece797528d8b33563

          SHA1

          38d311dfe68ca22d313813068dbc6575b7acc37d

          SHA256

          98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

          SHA512

          d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

        • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

          Filesize

          1.3MB

          MD5

          e582f585925a0c0ece797528d8b33563

          SHA1

          38d311dfe68ca22d313813068dbc6575b7acc37d

          SHA256

          98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

          SHA512

          d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

        • memory/912-188-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/912-184-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/1888-190-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1888-205-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1888-204-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1888-191-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1888-186-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1888-194-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2672-159-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB

        • memory/2672-162-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB

        • memory/2672-156-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB

        • memory/2672-150-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB

        • memory/3432-144-0x0000000000400000-0x0000000000553000-memory.dmp

          Filesize

          1.3MB

        • memory/3432-157-0x0000000000400000-0x0000000000553000-memory.dmp

          Filesize

          1.3MB

        • memory/3664-151-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/3664-164-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/3664-171-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/3664-146-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/3664-154-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/3664-163-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/4116-132-0x0000000000400000-0x0000000000553000-memory.dmp

          Filesize

          1.3MB

        • memory/4116-141-0x0000000000400000-0x0000000000553000-memory.dmp

          Filesize

          1.3MB

        • memory/4972-174-0x0000000000400000-0x0000000000553000-memory.dmp

          Filesize

          1.3MB

        • memory/4972-178-0x0000000000400000-0x0000000000553000-memory.dmp

          Filesize

          1.3MB