Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

31/01/2023, 19:12

230131-xwpy7abf5y 8

31/01/2023, 19:10

230131-xvlkdabf5w 8

Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    31/01/2023, 19:10

General

  • Target

    osu!.exe

  • Size

    4.3MB

  • MD5

    58aed0b0330ca0b78ae291c6d17d890c

  • SHA1

    f1957608185dbc3086e0e1e1c7dec1d3aea92654

  • SHA256

    be5854f78c69dd6b519b618eb57d7572c4ea15ef2dbd66d45d78abf2c3c72baf

  • SHA512

    f5938fa10ede164e80918020d97f8c4a7627bb9cae56980853f41b424e3d9977fd5b1795b1a9a3cd32d3c1bbf141931874e1ed102858d4f2e34d922d7aaa024d

  • SSDEEP

    98304:CWLZg3h2kgwD6JkgIVzLUDQWvnUlNVKsEXXjZzLpxRxpDOhL:CWLZg3h2kgwD6JkgIBUDVnWNVKsEXXj4

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\osu!.exe
    "C:\Users\Admin\AppData\Local\Temp\osu!.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Users\Admin\AppData\Local\osu!\osu!.exe
      "C:\Users\Admin\AppData\Local\osu!\osu!.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3100
  • C:\Windows\System32\GameBarPresenceWriter.exe
    "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
    1⤵
      PID:4400
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1088
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
      1⤵
      • Drops desktop.ini file(s)
      • Checks processor information in registry
      • Modifies registry class
      PID:2688
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
      1⤵
      • Checks processor information in registry
      • Modifies registry class
      PID:3608

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

      Filesize

      765B

      MD5

      41d6f6a2484acac005dd897acbb8b513

      SHA1

      03f030ad184c2e8c8a72b956f517054d850bdf57

      SHA256

      d261b935332a18706116de550c081bbc590fd5f0540ebd89b600d1016732c93a

      SHA512

      b974f154ac229f408e6d19414a0379d8c6afa118349b38333c6abad3dd1adb42b2c2115d9a0045b83f3c2ad66c1679eac49a383796066295a8ca949f7aa09660

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_C99E84AF904BD8598CB3FED576528926

      Filesize

      637B

      MD5

      c8be0ed856bdd09f38e9284b8472e455

      SHA1

      ad624ea233ecfb7091cf18c9a44b89e541b3fb3a

      SHA256

      98bf31534cd43c36a6a758abe77120d0d9151bf539de3c6bbe137bb3e8905c82

      SHA512

      763d8368b5fe242123468fe2d3d7bf52ab3a2bcf756611b6472f34a8322ab74ca053c0fd0d59a3ea96b5b5aca4f655e5d8789b67aa48076916f52a62d50b4132

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

      Filesize

      1KB

      MD5

      2ba38f38e1bbf7a0b86e4513488af1c9

      SHA1

      fdd898035a413a99a331733240d8a55779d2cedb

      SHA256

      eea4e560cfd565e1ccd40b747e56dea4f40953484c4dab34e346931c1f96365e

      SHA512

      43270b976acd9510871d19695aa14ee9ffec6a1ec900d33afc9bed6f18d56d9d52295379b6b2afba2d3d8dd5467bc5f08566156647b502489fe523913ef7d03c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB

      Filesize

      484B

      MD5

      a07957578808c7dfed7a39883364095a

      SHA1

      d27619fdb426c4800b36ca4966fcfd43fcb946e1

      SHA256

      ff03a30a0842595eef58a6b2d5aed31b822db672e9d54dc9106fc53d4b914d28

      SHA512

      dc226fa3f8515035197786d643a036a406fca54f107ad2b2ce9ba65d2d6cc486ad13a9fc25ebb6863ffd7fc4a1adefe07615b353cedca23a2b27cdbe4c177be7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_C99E84AF904BD8598CB3FED576528926

      Filesize

      488B

      MD5

      048a829a906b9405f0800b228747ea76

      SHA1

      7e4122a7105a7e3913b11dfbc58f147b27737738

      SHA256

      e087a0942a30c94e7100299141489f69b319a3af43beded6b2febf3ee780dd71

      SHA512

      fb030531742e0f471ef90dac1b1e7fe93e130c19817d49aa148d3e3caa0b70d2e191f2f76cd0e13f016d50141ff2d9fb09096295621e62fb848ac3049976c091

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F

      Filesize

      482B

      MD5

      d5974476adc199b805794900add8fd3b

      SHA1

      46c05c76d4a13d139e01905c8378847da275ca05

      SHA256

      ba77fa46b1260ba3122403f7a986502cb9ff9d905a7131f6051674fd2cb8338e

      SHA512

      258e7cd9e76b4223a105460543d825df346c2eb9d8942678fd12c9c5d2bd2a24b18c72b31242613394b466426fb5612981f387074a88609d4f3b65c0e20833a1

    • C:\Users\Admin\AppData\Local\osu!\osu!.exe

      Filesize

      4.3MB

      MD5

      58aed0b0330ca0b78ae291c6d17d890c

      SHA1

      f1957608185dbc3086e0e1e1c7dec1d3aea92654

      SHA256

      be5854f78c69dd6b519b618eb57d7572c4ea15ef2dbd66d45d78abf2c3c72baf

      SHA512

      f5938fa10ede164e80918020d97f8c4a7627bb9cae56980853f41b424e3d9977fd5b1795b1a9a3cd32d3c1bbf141931874e1ed102858d4f2e34d922d7aaa024d

    • C:\Users\Admin\AppData\Local\osu!\osu!.exe

      Filesize

      4.3MB

      MD5

      58aed0b0330ca0b78ae291c6d17d890c

      SHA1

      f1957608185dbc3086e0e1e1c7dec1d3aea92654

      SHA256

      be5854f78c69dd6b519b618eb57d7572c4ea15ef2dbd66d45d78abf2c3c72baf

      SHA512

      f5938fa10ede164e80918020d97f8c4a7627bb9cae56980853f41b424e3d9977fd5b1795b1a9a3cd32d3c1bbf141931874e1ed102858d4f2e34d922d7aaa024d

    • memory/2584-132-0x0000000000BB0000-0x0000000000FF6000-memory.dmp

      Filesize

      4.3MB

    • memory/2584-136-0x000000000B240000-0x000000000B76C000-memory.dmp

      Filesize

      5.2MB

    • memory/2584-135-0x0000000007120000-0x000000000712A000-memory.dmp

      Filesize

      40KB

    • memory/2584-134-0x0000000005A20000-0x0000000005AB2000-memory.dmp

      Filesize

      584KB

    • memory/2584-133-0x00000000060C0000-0x0000000006664000-memory.dmp

      Filesize

      5.6MB

    • memory/3100-146-0x000000000ACE0000-0x000000000AD02000-memory.dmp

      Filesize

      136KB