Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
Use_50505_...rd.rar
windows10-2004-x64
Setup.exe
windows10-2004-x64
5langs/Croatian.ini
windows10-2004-x64
1langs/Danish.ini
windows10-2004-x64
1langs/English.ini
windows10-2004-x64
1langs/Finnish.ini
windows10-2004-x64
1langs/Hebrew.ini
windows10-2004-x64
1langs/Hungarian.ps1
windows10-2004-x64
1langs/Indonesian.ini
windows10-2004-x64
1langs/Japanese.ini
windows10-2004-x64
1langs/Kazakh.ini
windows10-2004-x64
1langs/Korean.ps1
windows10-2004-x64
1langs/Kurdish.ini
windows10-2004-x64
1langs/Norwegian.ini
windows10-2004-x64
1langs/SimpChinese.ini
windows10-2004-x64
1langs/Sinhala.ini
windows10-2004-x64
1langs/Slovak.ini
windows10-2004-x64
1langs/Swedish.ini
windows10-2004-x64
1langs/Thai.ini
windows10-2004-x64
1langs/TradChinese.ini
windows10-2004-x64
1langs/Ukrainian.ini
windows10-2004-x64
1langs/UyghurLatin.ini
windows10-2004-x64
1langs/Uzbek.ini
windows10-2004-x64
1langs/Vietnamese.ini
windows10-2004-x64
1Analysis
-
max time kernel
360s -
max time network
347s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2022, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
Use_50505_As_Passw0rd.rar
Resource
win10v2004-20221111-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
langs/Croatian.ini
Resource
win10v2004-20220901-en
Behavioral task
behavioral4
Sample
langs/Danish.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
langs/English.ini
Resource
win10v2004-20221111-en
Behavioral task
behavioral6
Sample
langs/Finnish.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
langs/Hebrew.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
langs/Hungarian.ps1
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
langs/Indonesian.ini
Resource
win10v2004-20221111-en
Behavioral task
behavioral10
Sample
langs/Japanese.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
langs/Kazakh.ini
Resource
win10v2004-20221111-en
Behavioral task
behavioral12
Sample
langs/Korean.ps1
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
langs/Kurdish.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral14
Sample
langs/Norwegian.ini
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
langs/SimpChinese.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral16
Sample
langs/Sinhala.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
langs/Slovak.ini
Resource
win10v2004-20221111-en
Behavioral task
behavioral18
Sample
langs/Swedish.ini
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
langs/Thai.ini
Resource
win10v2004-20220901-en
Behavioral task
behavioral20
Sample
langs/TradChinese.ini
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
langs/Ukrainian.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
langs/UyghurLatin.ini
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
langs/Uzbek.ini
Resource
win10v2004-20220812-en
Behavioral task
behavioral24
Sample
langs/Vietnamese.ini
Resource
win10v2004-20221111-en
General
-
Target
Setup.exe
-
Size
413.9MB
-
MD5
af15e6423b24652d4a41311e26b96f28
-
SHA1
585757a832d6e923ea3fc7051eb7412b62c34ad6
-
SHA256
2727709123d4fd26090c227402a09e5779cec516d615d27e02faf1f346c9d895
-
SHA512
bc666bd4fecb39590c199b933e7dfec345a01e5db44a8c8e636d7727378b6471a00e14f3c81d93bb82e22aea695bf71acae6f576e77b370f620dc290aed6075b
-
SSDEEP
24576:PnP39FKtLH3nq6WEs6dW8VX5+nfO5dTzNYMhSl4:vP3cuo1SfO5hzxhSl4
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{09A872B9-3A46-4F6D-94EC-9386499D2EBC}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{EDDF74BE-2470-4550-9D8A-F9B2AFD486F9}.catalogItem svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 448 set thread context of 5100 448 Setup.exe 76 -
Program crash 1 IoCs
pid pid_target Process procid_target 2320 448 WerFault.exe 75 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 448 wrote to memory of 5100 448 Setup.exe 76 PID 448 wrote to memory of 5100 448 Setup.exe 76 PID 448 wrote to memory of 5100 448 Setup.exe 76 PID 448 wrote to memory of 5100 448 Setup.exe 76 PID 448 wrote to memory of 5100 448 Setup.exe 76 PID 448 wrote to memory of 5100 448 Setup.exe 76 PID 448 wrote to memory of 5100 448 Setup.exe 76 PID 448 wrote to memory of 5100 448 Setup.exe 76 PID 448 wrote to memory of 5100 448 Setup.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:5100
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 448 -s 14002⤵
- Program crash
PID:2320
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 432 -p 448 -ip 4481⤵PID:2156
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4380