Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2022, 18:46

General

  • Target

    01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9.exe

  • Size

    2.0MB

  • MD5

    c5d373a1954822afcddcc785e6ad6045

  • SHA1

    4db2eea6bd6cf5ea40ea14c3ecbf3845d05dae73

  • SHA256

    01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9

  • SHA512

    67a44eef568aa7d3444313256146af4e26a8614326f0b6ecf029f765733c38fb8ab54986f25969a9030de3a3bf9408373e0c1d23b049e0cfb908fa8faf1d981a

  • SSDEEP

    24576:S2IOcUV7/Fbi06CFZZxdhf8T7njJfl0POn2AknzL+STqPeoAt6ae7yStHq+p19Sk:S1UVbRioFZZxT6SOn2AHbSTJA9TyC131

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9.exe
    "C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4708
    • C:\Users\Admin\mOkYAwEc\VGIUAgQM.exe
      "C:\Users\Admin\mOkYAwEc\VGIUAgQM.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3068
    • C:\ProgramData\MagQcMAA\ImwQgEsE.exe
      "C:\ProgramData\MagQcMAA\ImwQgEsE.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3112
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9.exe
        C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4208
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4692
          • C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9.exe
            C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3396
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:448
              • C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9.exe
                C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9
                7⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4432
            • C:\Windows\SysWOW64\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
              6⤵
              • Modifies visibility of file extensions in Explorer
              • Modifies registry key
              PID:1144
            • C:\Windows\SysWOW64\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
              6⤵
              • Modifies registry key
              PID:2872
            • C:\Windows\SysWOW64\reg.exe
              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
              6⤵
              • UAC bypass
              • Modifies registry key
              PID:956
        • C:\Windows\SysWOW64\reg.exe
          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
          4⤵
          • Modifies visibility of file extensions in Explorer
          • Modifies registry key
          PID:4520
        • C:\Windows\SysWOW64\reg.exe
          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
          4⤵
          • Modifies registry key
          PID:4752
        • C:\Windows\SysWOW64\reg.exe
          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
          4⤵
          • UAC bypass
          • Modifies registry key
          PID:4704
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies registry key
      PID:3896
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
      2⤵
      • Modifies registry key
      PID:1948
    • C:\Windows\SysWOW64\reg.exe
      reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:3632
  • C:\ProgramData\DkMgswQk\UcIcsgEk.exe
    C:\ProgramData\DkMgswQk\UcIcsgEk.exe
    1⤵
    • Executes dropped EXE
    PID:4668
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4608
  • C:\ProgramData\DkMgswQk\UcIcsgEk.exe
    C:\ProgramData\DkMgswQk\UcIcsgEk.exe
    1⤵
    • Executes dropped EXE
    PID:3332
  • C:\ProgramData\DkMgswQk\UcIcsgEk.exe
    C:\ProgramData\DkMgswQk\UcIcsgEk.exe
    1⤵
    • Executes dropped EXE
    PID:2896
  • C:\ProgramData\DkMgswQk\UcIcsgEk.exe
    C:\ProgramData\DkMgswQk\UcIcsgEk.exe
    1⤵
    • Executes dropped EXE
    PID:272

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\DkMgswQk\UcIcsgEk.exe

    Filesize

    2.0MB

    MD5

    11ca9ec09067e910505122ece2d7bac0

    SHA1

    72d7d4a915b7f46b55a4d3e34f880b9f1c4b8f4a

    SHA256

    9219f88b0923b1e979eeadbc6dda154d9cf6ec008d66a6620a1cb2f9d3139b02

    SHA512

    145fac8b1fa8afd79e2e206d0f1b88118e7231f799bb81f01b3f7be86db7e99f29951b62c1e990e1d243c6cb8e0e4980869fd7ba4f5730d3ef1bc94c78a912c4

  • C:\ProgramData\DkMgswQk\UcIcsgEk.exe

    Filesize

    2.0MB

    MD5

    11ca9ec09067e910505122ece2d7bac0

    SHA1

    72d7d4a915b7f46b55a4d3e34f880b9f1c4b8f4a

    SHA256

    9219f88b0923b1e979eeadbc6dda154d9cf6ec008d66a6620a1cb2f9d3139b02

    SHA512

    145fac8b1fa8afd79e2e206d0f1b88118e7231f799bb81f01b3f7be86db7e99f29951b62c1e990e1d243c6cb8e0e4980869fd7ba4f5730d3ef1bc94c78a912c4

  • C:\ProgramData\DkMgswQk\UcIcsgEk.exe

    Filesize

    2.0MB

    MD5

    11ca9ec09067e910505122ece2d7bac0

    SHA1

    72d7d4a915b7f46b55a4d3e34f880b9f1c4b8f4a

    SHA256

    9219f88b0923b1e979eeadbc6dda154d9cf6ec008d66a6620a1cb2f9d3139b02

    SHA512

    145fac8b1fa8afd79e2e206d0f1b88118e7231f799bb81f01b3f7be86db7e99f29951b62c1e990e1d243c6cb8e0e4980869fd7ba4f5730d3ef1bc94c78a912c4

  • C:\ProgramData\DkMgswQk\UcIcsgEk.exe

    Filesize

    2.0MB

    MD5

    11ca9ec09067e910505122ece2d7bac0

    SHA1

    72d7d4a915b7f46b55a4d3e34f880b9f1c4b8f4a

    SHA256

    9219f88b0923b1e979eeadbc6dda154d9cf6ec008d66a6620a1cb2f9d3139b02

    SHA512

    145fac8b1fa8afd79e2e206d0f1b88118e7231f799bb81f01b3f7be86db7e99f29951b62c1e990e1d243c6cb8e0e4980869fd7ba4f5730d3ef1bc94c78a912c4

  • C:\ProgramData\DkMgswQk\UcIcsgEk.exe

    Filesize

    2.0MB

    MD5

    11ca9ec09067e910505122ece2d7bac0

    SHA1

    72d7d4a915b7f46b55a4d3e34f880b9f1c4b8f4a

    SHA256

    9219f88b0923b1e979eeadbc6dda154d9cf6ec008d66a6620a1cb2f9d3139b02

    SHA512

    145fac8b1fa8afd79e2e206d0f1b88118e7231f799bb81f01b3f7be86db7e99f29951b62c1e990e1d243c6cb8e0e4980869fd7ba4f5730d3ef1bc94c78a912c4

  • C:\ProgramData\MagQcMAA\ImwQgEsE.exe

    Filesize

    2.0MB

    MD5

    7a32faf6f4aa34e86d9fa8fe5a9e3d48

    SHA1

    9e815790653a8451971ac215956257f9c6b158c1

    SHA256

    8ee8ce3629526f80d21fda21d3862fbf090d3c4bb3ecf28d26cefc96cd4c99c4

    SHA512

    99e0425519ad79bf33f2d0ec13d59d823f42c0800a123369e26ca814caba70406f297eb9e383829f10ad4b1fa77ed17e41ef3c1e08135eaaa9077a8a8e3c5e45

  • C:\ProgramData\MagQcMAA\ImwQgEsE.exe

    Filesize

    2.0MB

    MD5

    7a32faf6f4aa34e86d9fa8fe5a9e3d48

    SHA1

    9e815790653a8451971ac215956257f9c6b158c1

    SHA256

    8ee8ce3629526f80d21fda21d3862fbf090d3c4bb3ecf28d26cefc96cd4c99c4

    SHA512

    99e0425519ad79bf33f2d0ec13d59d823f42c0800a123369e26ca814caba70406f297eb9e383829f10ad4b1fa77ed17e41ef3c1e08135eaaa9077a8a8e3c5e45

  • C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9

    Filesize

    6KB

    MD5

    8243501c8bec7c2fabcac8cb47d98048

    SHA1

    f03c28e2f966b10efdc0eafda6ed6d3ab14b7d43

    SHA256

    4f5230f4e5338c433953dfe6fc203f2cb1936ca7ad8a9d6aed0afb583a1639fd

    SHA512

    5de50003977c1b5c4f55132465d0a5589a32a00f388c6c57fbc9da42fcb7368578ebb6e9b541e2656dc07fb9c0a77cea75f990316be67ed5bffeed47385a5aa7

  • C:\Users\Admin\AppData\Local\Temp\01d2e2b398d6017d5114464e39c40e9243ae492106cca8b2d3eb1a95f9e228a9

    Filesize

    6KB

    MD5

    8243501c8bec7c2fabcac8cb47d98048

    SHA1

    f03c28e2f966b10efdc0eafda6ed6d3ab14b7d43

    SHA256

    4f5230f4e5338c433953dfe6fc203f2cb1936ca7ad8a9d6aed0afb583a1639fd

    SHA512

    5de50003977c1b5c4f55132465d0a5589a32a00f388c6c57fbc9da42fcb7368578ebb6e9b541e2656dc07fb9c0a77cea75f990316be67ed5bffeed47385a5aa7

  • C:\Users\Admin\mOkYAwEc\VGIUAgQM.exe

    Filesize

    2.1MB

    MD5

    81d3a8f05ffec8d10ba9dad818d855dc

    SHA1

    ea9079a62da2a1e2f95452133f7c02b9828e9f2e

    SHA256

    6d3836c6d5e496d25525dfa3a8c3c42bf85161cf7dfd66621462a085eac9165b

    SHA512

    d06d2b336da04a21e460731d098c5e289babb743b653758707a6a30f40280765198d4c75f1f9a8e84bd09dbb96429655d7bdf1bac81071645f7ee5b80d70c5a0

  • C:\Users\Admin\mOkYAwEc\VGIUAgQM.exe

    Filesize

    2.1MB

    MD5

    81d3a8f05ffec8d10ba9dad818d855dc

    SHA1

    ea9079a62da2a1e2f95452133f7c02b9828e9f2e

    SHA256

    6d3836c6d5e496d25525dfa3a8c3c42bf85161cf7dfd66621462a085eac9165b

    SHA512

    d06d2b336da04a21e460731d098c5e289babb743b653758707a6a30f40280765198d4c75f1f9a8e84bd09dbb96429655d7bdf1bac81071645f7ee5b80d70c5a0

  • memory/2896-176-0x0000000000700000-0x0000000000732000-memory.dmp

    Filesize

    200KB

  • memory/3068-139-0x0000000000400000-0x0000000000623000-memory.dmp

    Filesize

    2.1MB

  • memory/3068-146-0x0000000000400000-0x0000000000623000-memory.dmp

    Filesize

    2.1MB

  • memory/3068-137-0x0000000002140000-0x00000000021F1000-memory.dmp

    Filesize

    708KB

  • memory/3068-141-0x0000000002140000-0x00000000021F1000-memory.dmp

    Filesize

    708KB

  • memory/3112-152-0x0000000000400000-0x000000000060B000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-145-0x00000000020D0000-0x00000000021BE000-memory.dmp

    Filesize

    952KB

  • memory/3112-147-0x0000000000400000-0x000000000060B000-memory.dmp

    Filesize

    2.0MB

  • memory/3112-151-0x00000000020D0000-0x00000000021BE000-memory.dmp

    Filesize

    952KB

  • memory/3332-165-0x0000000000650000-0x0000000000682000-memory.dmp

    Filesize

    200KB

  • memory/3332-163-0x0000000000650000-0x0000000000682000-memory.dmp

    Filesize

    200KB

  • memory/3332-166-0x0000000000650000-0x0000000000682000-memory.dmp

    Filesize

    200KB

  • memory/3396-175-0x0000000000400000-0x0000000000607000-memory.dmp

    Filesize

    2.0MB

  • memory/3396-173-0x0000000000820000-0x00000000008B2000-memory.dmp

    Filesize

    584KB

  • memory/4208-160-0x0000000000820000-0x00000000008B2000-memory.dmp

    Filesize

    584KB

  • memory/4208-161-0x0000000000400000-0x0000000000607000-memory.dmp

    Filesize

    2.0MB

  • memory/4208-164-0x0000000000400000-0x0000000000607000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-183-0x0000000000770000-0x0000000000802000-memory.dmp

    Filesize

    584KB

  • memory/4432-186-0x0000000000400000-0x0000000000607000-memory.dmp

    Filesize

    2.0MB

  • memory/4432-184-0x0000000000400000-0x0000000000607000-memory.dmp

    Filesize

    2.0MB

  • memory/4668-154-0x0000000000630000-0x0000000000662000-memory.dmp

    Filesize

    200KB

  • memory/4668-153-0x0000000000630000-0x0000000000662000-memory.dmp

    Filesize

    200KB

  • memory/4668-150-0x0000000000630000-0x0000000000662000-memory.dmp

    Filesize

    200KB

  • memory/4708-138-0x0000000002360000-0x00000000023F2000-memory.dmp

    Filesize

    584KB

  • memory/4708-140-0x0000000000400000-0x0000000000607000-memory.dmp

    Filesize

    2.0MB

  • memory/4708-132-0x0000000002360000-0x00000000023F2000-memory.dmp

    Filesize

    584KB

  • memory/4708-133-0x0000000000400000-0x0000000000607000-memory.dmp

    Filesize

    2.0MB