Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2023, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe
Resource
win10v2004-20221111-en
General
-
Target
0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe
-
Size
951KB
-
MD5
a3df44994428bfe9b70f9774e76347bb
-
SHA1
0eac1f1303e55f7c0239af4b1eca3e992ed05693
-
SHA256
52ab9f2e3878dd9fa61c7bbbdfff113485fb4c12f8af0fa28b938696d68e54bb
-
SHA512
75bf4289be57495b878b06d6bc540911b31508753e8fb4ec1bbeec29dad124de9cdc75e378c657728e0d77278b8973ec5144f886b2305b8688e21572a0c20530
-
SSDEEP
24576:yli277DjOWEIycmmy7UmCJrYTSKIKTn6ALDx:UiWvhnyc7ytc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WindowUpdate\\WindowUpdate.exe" 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3804 set thread context of 4580 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3284 powershell.exe 1404 powershell.exe 3284 powershell.exe 1404 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3284 powershell.exe Token: SeDebugPrivilege 1404 powershell.exe Token: SeDebugPrivilege 4580 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4580 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3804 wrote to memory of 3284 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 84 PID 3804 wrote to memory of 3284 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 84 PID 3804 wrote to memory of 3284 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 84 PID 3804 wrote to memory of 1404 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 86 PID 3804 wrote to memory of 1404 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 86 PID 3804 wrote to memory of 1404 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 86 PID 3804 wrote to memory of 1084 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 88 PID 3804 wrote to memory of 1084 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 88 PID 3804 wrote to memory of 1084 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 88 PID 3804 wrote to memory of 4580 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 90 PID 3804 wrote to memory of 4580 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 90 PID 3804 wrote to memory of 4580 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 90 PID 3804 wrote to memory of 4580 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 90 PID 3804 wrote to memory of 4580 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 90 PID 3804 wrote to memory of 4580 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 90 PID 3804 wrote to memory of 4580 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 90 PID 3804 wrote to memory of 4580 3804 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\xStBrvuHffFYx.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xStBrvuHffFYx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1B96.tmp"2⤵
- Creates scheduled task(s)
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"C:\Users\Admin\AppData\Local\Temp\0eac1f1303e55f7c0239af4b1eca3e992ed05693.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4580
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD50608d164968e24760d653f3e205f759b
SHA10c73448c92d06e4a105cf16faec875ee72d2ef18
SHA2569d56a3c3ef9567ff28408e959e75ba0c829776610cd6febc83bd91ca5f469dac
SHA512882fabf67830dd842b9d40e6bf4535f8abe42a6cb8c0e6908d8f7e4a8ac5958b19367ec9bce80c12ccd2053511f92145168e50376374ffb5c538207e4e0f253c
-
Filesize
1KB
MD520270ee1906d68c62de9e6c6c738369d
SHA1289d58f8b57eb55f19c510dc95489ed89b1c9edd
SHA256d088d3a4c5ee929318e9e8287acd3af9e193c51300e08894b5a76c1e4762a52b
SHA51268c04d53f08b74e95c442479983853eeccb62ae7cee7a3b1a0b3536c9c028069dcef85a5349158eb0cbfcd0a428e6ab36f4730eb51a202df619056456e3c174d