Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 10:29

General

  • Target

    a1de0a76e4fcad4e2f7a7cfc8fb02cb5b2b64a99212e75fb883721430d8f065a.exe

  • Size

    1.2MB

  • MD5

    e826dd93eaf42cb082606e37543e9bba

  • SHA1

    72062694acd03db50bb45e1da80500cc23171afe

  • SHA256

    a1de0a76e4fcad4e2f7a7cfc8fb02cb5b2b64a99212e75fb883721430d8f065a

  • SHA512

    6123e615b93657bb96fdb7442703186a1182ff61d44128217c2646073a0e154fd657be1282c35711c96ed3eff0d8a28bc98d88b94b97ce838ccfa43dbba036d5

  • SSDEEP

    24576:j0ygUZcPs1/qp0HGNJMIWYTGfArcmZUOVrB3a5H290J:joXPDypDYTZTZpVrL90

Malware Config

Signatures

  • Windows security bypass 2 TTPs 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1de0a76e4fcad4e2f7a7cfc8fb02cb5b2b64a99212e75fb883721430d8f065a.exe
    "C:\Users\Admin\AppData\Local\Temp\a1de0a76e4fcad4e2f7a7cfc8fb02cb5b2b64a99212e75fb883721430d8f065a.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files (x86)\CSec\cs.exe
      "C:\Program Files (x86)\CSec\cs.exe"
      2⤵
      • Windows security bypass
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:4304
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A1DE0A~1.EXE > nul
      2⤵
        PID:3968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\CSec\cs.exe

      Filesize

      1.2MB

      MD5

      e826dd93eaf42cb082606e37543e9bba

      SHA1

      72062694acd03db50bb45e1da80500cc23171afe

      SHA256

      a1de0a76e4fcad4e2f7a7cfc8fb02cb5b2b64a99212e75fb883721430d8f065a

      SHA512

      6123e615b93657bb96fdb7442703186a1182ff61d44128217c2646073a0e154fd657be1282c35711c96ed3eff0d8a28bc98d88b94b97ce838ccfa43dbba036d5

    • C:\Program Files (x86)\CSec\cs.exe

      Filesize

      1.2MB

      MD5

      e826dd93eaf42cb082606e37543e9bba

      SHA1

      72062694acd03db50bb45e1da80500cc23171afe

      SHA256

      a1de0a76e4fcad4e2f7a7cfc8fb02cb5b2b64a99212e75fb883721430d8f065a

      SHA512

      6123e615b93657bb96fdb7442703186a1182ff61d44128217c2646073a0e154fd657be1282c35711c96ed3eff0d8a28bc98d88b94b97ce838ccfa43dbba036d5

    • C:\ProgramData\Microsoft\Windows\Start Menu\CSec\Computer Scan.lnk

      Filesize

      1KB

      MD5

      806979f32b039a185aefe3ac06bd5134

      SHA1

      de39ec040474fd994169abc51785fbe87218f0f3

      SHA256

      37a4ed75c35276a0b1fb148279b775343ac78520e9afe0173942007eba4c5155

      SHA512

      0d2bb659c6cedf5b7e5a98abefe60e51a4653717ad38b1889b57955a3732e22eaa2a28cbdd03216b747a2eb2e0cad970a2f8279eaee1e19d770a53aef3080399

    • C:\ProgramData\Microsoft\Windows\Start Menu\CSec\Cyber Security.lnk

      Filesize

      1KB

      MD5

      c383fd3f4f29f4604feebda9071eca68

      SHA1

      b9e1811b799e2f8696d9d84767248326682a0d95

      SHA256

      d69305c7b1d690f58606b107a804c8b00dc3f5a26d1499dc232551751fe97081

      SHA512

      caeb280bc85c50f02635ed1d74e8034ee6c58eb8e7f3872570275db4b9b63282fc856b3323d90d7aa5ecb54d19d2463b7118be40baf66bf5841c1213541ce654

    • C:\ProgramData\Microsoft\Windows\Start Menu\CSec\Help.lnk

      Filesize

      1KB

      MD5

      8330cede3578b3e68728d3b9dcb49fd3

      SHA1

      bdaa74d1f30346a4b478f218914be6b9ec6c6ebd

      SHA256

      9ad3ba1f1be35565deac3ace2cbae7fbb9c7bac1e1ad536b02cac195b746a38e

      SHA512

      a912e0574f6aa2ca48a7abbc1036300bdf558b7da1cdc009a62fffa5f1b54f371cc800b481019f166e277a5dd21897ddd489b6d9451a49befd79d13789d23dc7

    • C:\ProgramData\Microsoft\Windows\Start Menu\CSec\Security Center.lnk

      Filesize

      1KB

      MD5

      70b8a75f0ff72fcf365595e1ec0cc541

      SHA1

      251dff20f7f0499fec368ef94665eaa74e637013

      SHA256

      6fbc82c99c43808fdf2f2791d86099467fa67039e6ce962c6cd7c345ef0089aa

      SHA512

      91aa46c72cc808d74a7d60b69dd9ced5295a64e7cbd931daef6179988f39302f644a18d65f572fc21a30a90582dfb2e0eabb88a9b8ba6dc7a6778ab4381cf487

    • C:\ProgramData\Microsoft\Windows\Start Menu\CSec\Settings.lnk

      Filesize

      1KB

      MD5

      5b7fbd1584a8d5deb16cc57fbb858753

      SHA1

      1c0b2fc4c139df3f3ed1b680f41fdef9670125cf

      SHA256

      057ac2dab8a620cd452b75abfd30fdfcda53254e5812244d4305ca901d0a8b8a

      SHA512

      a217f5486acf083cec7c89346195654596f6c740206392e5b3361852a3d9b915dadb1e0c7d90a5b17da004321f1bd601f58f2cab26c0adc3df46fe2e7de84fd6

    • C:\ProgramData\Microsoft\Windows\Start Menu\CSec\Update.lnk

      Filesize

      1KB

      MD5

      5ce1d24f55870e9cb94ee9d527cb99fa

      SHA1

      b3851c06ff92b57e4e8a62b5f67939b8caf192ef

      SHA256

      fca899dcf7a043f99334284f3f24997abb9114d2df94bc839cf8319b0b03e485

      SHA512

      b33daf5028c59e4c3e612d443d9faeaeddd2af2e39f81caf246bce7726511ee1fccfbb3a06dfffb79ca96d54e84b9ffcd3ef29ea1269fff217121f80193af0cd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\CSec.lnk

      Filesize

      1KB

      MD5

      9ac28052ebf318cd686fd4bb63bbc52a

      SHA1

      eead39770a71209ee1567a2419d38538c25a2734

      SHA256

      1de2a87705b3b11f970afc0941dc1c0ca12b80c642fdad7bf68d1da0d1bd2652

      SHA512

      85cf5f78159930b9c86c2cefe697e9e86901542defc0a94a44e2887f6e0b6af649cffc47a98e80116cf17a91d95a901564f09ff9c762b44bacd79abcecc581b8

    • C:\Users\Admin\Desktop\Cyber Security.lnk

      Filesize

      1KB

      MD5

      098363b830ef00557ae083727c445c6d

      SHA1

      dad6497519b6cf3f2be64d0dab9f6e9208c10e2f

      SHA256

      8ba802ae3e38df7225abf459a07a059a2847bd069ce210d1a414f73b91044357

      SHA512

      2fa5b418320acc96f97b005d737537c82c351bebc83c84f572bc6c558efdee1ee2915c0acf665fb5ece729065d10dda365c64ed6b39845e4c1180a2e2c368a4c

    • memory/1724-132-0x0000000000400000-0x00000000006FF000-memory.dmp

      Filesize

      3.0MB

    • memory/1724-141-0x0000000000400000-0x00000000006FF000-memory.dmp

      Filesize

      3.0MB

    • memory/4304-148-0x0000000000400000-0x00000000006FF000-memory.dmp

      Filesize

      3.0MB

    • memory/4304-149-0x0000000000400000-0x00000000006FF000-memory.dmp

      Filesize

      3.0MB