Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2023, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe
Resource
win10v2004-20221111-en
General
-
Target
21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe
-
Size
260KB
-
MD5
e154be10e86c3b4ef92ec179ef7f8fd1
-
SHA1
2a99469cbf4e7b4e8a9c466756a6ae88eb344967
-
SHA256
21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b
-
SHA512
1434fcb691f52568f8e8d136cd1d2906c046d4f44be5adae2612e5193c4da1ca45af6226fe41b819710109d4b8bb9dbc45a981f01e64a3911726f7ac2ee2c80a
-
SSDEEP
3072:PXEvKdWLyRcVeYX1T51b+aDMe3K/TtolpJU5AvXm9hZCRRzMuWZgd3n:/eLFVeYX1iSMU4TilUqXucqgd3
Malware Config
Extracted
tofsee
svartalfheim.top
jotunheim.name
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4680 hbdlhbha.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4820 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\apofflxq\ImagePath = "C:\\Windows\\SysWOW64\\apofflxq\\hbdlhbha.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4680 set thread context of 3860 4680 hbdlhbha.exe 105 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3724 sc.exe 1316 sc.exe 4304 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4512 4716 WerFault.exe 82 5060 4680 WerFault.exe 97 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = d4bd973ded8ca10124edb47d450dd49d084297dce82e72baa4c0548a3245b61d1677fa2a85cd945d24edb47d470dd49d024195daf71261adc06d04fda6e22673bbc9154961cda56810db8d44703de5a8644490bdb17e25ec9d5903cffc8d3c74bbc4103d36fda06a1dde864f7334d4f10b4c90d8f6127db9a4593494b48d662fd69a430f32fea05d579fc2223064b9f8641ccd8eb37b25e593543491abee3571bbd91d5061cda56810db8d44703ce1ae64c9d4c084a455e8f86d34fdc48c541de4da1b4f6f92e72f52edb47d440dd49d641fb12b440814dda46d3731d68e541de4ac450a32e3a56c17c3854c7123e5a85c2df4bd844d14dda46d34fdc48d541de4ad743d04cd945d24edb47d440dd49d642df4bd844d14dda46d34fdc48d541de4ad943c04cd svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4092 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 85 PID 4716 wrote to memory of 4092 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 85 PID 4716 wrote to memory of 4092 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 85 PID 4716 wrote to memory of 3704 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 88 PID 4716 wrote to memory of 3704 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 88 PID 4716 wrote to memory of 3704 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 88 PID 4716 wrote to memory of 3724 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 90 PID 4716 wrote to memory of 3724 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 90 PID 4716 wrote to memory of 3724 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 90 PID 4716 wrote to memory of 1316 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 93 PID 4716 wrote to memory of 1316 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 93 PID 4716 wrote to memory of 1316 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 93 PID 4716 wrote to memory of 4304 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 95 PID 4716 wrote to memory of 4304 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 95 PID 4716 wrote to memory of 4304 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 95 PID 4716 wrote to memory of 4820 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 98 PID 4716 wrote to memory of 4820 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 98 PID 4716 wrote to memory of 4820 4716 21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe 98 PID 4680 wrote to memory of 3860 4680 hbdlhbha.exe 105 PID 4680 wrote to memory of 3860 4680 hbdlhbha.exe 105 PID 4680 wrote to memory of 3860 4680 hbdlhbha.exe 105 PID 4680 wrote to memory of 3860 4680 hbdlhbha.exe 105 PID 4680 wrote to memory of 3860 4680 hbdlhbha.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe"C:\Users\Admin\AppData\Local\Temp\21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\apofflxq\2⤵PID:4092
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hbdlhbha.exe" C:\Windows\SysWOW64\apofflxq\2⤵PID:3704
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create apofflxq binPath= "C:\Windows\SysWOW64\apofflxq\hbdlhbha.exe /d\"C:\Users\Admin\AppData\Local\Temp\21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3724
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description apofflxq "wifi internet conection"2⤵
- Launches sc.exe
PID:1316
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start apofflxq2⤵
- Launches sc.exe
PID:4304
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 6802⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\apofflxq\hbdlhbha.exeC:\Windows\SysWOW64\apofflxq\hbdlhbha.exe /d"C:\Users\Admin\AppData\Local\Temp\21a0e859e84fcd7159996c98c8d9450845cf9dd4677edf6280b377e6f2e5ed9b.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 5162⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4716 -ip 47161⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4680 -ip 46801⤵PID:1048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.0MB
MD58a3af81f3e77c85514e3aad5735241dc
SHA1df7ea02ed3f1e87cae8851740b46705b47f16ab4
SHA256662b03751a1e25551fc56beb9ccf4d5ab55eee2dcb50ef15f6511023b34e3890
SHA512d5bcf5840c0031b8686453d302fcf1e2d3c1ce1f6a39ec76dfa340696cc122ffb0dbba5be09436c618cdd10aea486f298d5d8826ea7fea3aee7e1bc88bbb5fc6
-
Filesize
12.0MB
MD58a3af81f3e77c85514e3aad5735241dc
SHA1df7ea02ed3f1e87cae8851740b46705b47f16ab4
SHA256662b03751a1e25551fc56beb9ccf4d5ab55eee2dcb50ef15f6511023b34e3890
SHA512d5bcf5840c0031b8686453d302fcf1e2d3c1ce1f6a39ec76dfa340696cc122ffb0dbba5be09436c618cdd10aea486f298d5d8826ea7fea3aee7e1bc88bbb5fc6