Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
Full_Version/Sеtup.exe
Resource
win7-20230220-en
General
-
Target
Full_Version/Sеtup.exe
-
Size
733.4MB
-
MD5
27b1f6e6a22fb3cc7ea8e1eab16768d8
-
SHA1
3f459434e3857017225857638597fda71210e170
-
SHA256
f3f5d6a9fdcb53246bcc3660e7802199ca1f3bdea88724fcc8f0fda3441cba4c
-
SHA512
a31fabf178a4fa9c60f582899296e78fa3832301c881b3969c04634ec00aec172a643ce3518314b403e37ce06bbe7aaca041abe438225ee06c3615efa0659b50
-
SSDEEP
393216:gZTPNjdghreKEpUFuTrVUkznVydZ3yRlBhBtKhRMg:aTlYbEjBUkbkbygzMg
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Sеtup.exe -
Executes dropped EXE 4 IoCs
pid Process 4608 YyP3MrN3.exe 4408 L1H2Kme8.exe 2780 DocumentsSoftwareDistribution-type1.6.1.5.exe 408 DocumentsSoftwareDistribution-type1.6.1.5.exe -
Loads dropped DLL 3 IoCs
pid Process 1420 Sеtup.exe 1420 Sеtup.exe 1420 Sеtup.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4348 icacls.exe 2596 icacls.exe 5008 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1420 Sеtup.exe 1420 Sеtup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4608 set thread context of 1512 4608 YyP3MrN3.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1420 Sеtup.exe 1420 Sеtup.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1420 wrote to memory of 4608 1420 Sеtup.exe 91 PID 1420 wrote to memory of 4608 1420 Sеtup.exe 91 PID 1420 wrote to memory of 4608 1420 Sеtup.exe 91 PID 4608 wrote to memory of 1512 4608 YyP3MrN3.exe 93 PID 4608 wrote to memory of 1512 4608 YyP3MrN3.exe 93 PID 4608 wrote to memory of 1512 4608 YyP3MrN3.exe 93 PID 4608 wrote to memory of 1512 4608 YyP3MrN3.exe 93 PID 4608 wrote to memory of 1512 4608 YyP3MrN3.exe 93 PID 1420 wrote to memory of 4408 1420 Sеtup.exe 94 PID 1420 wrote to memory of 4408 1420 Sеtup.exe 94 PID 4408 wrote to memory of 2184 4408 L1H2Kme8.exe 96 PID 4408 wrote to memory of 2184 4408 L1H2Kme8.exe 96 PID 2184 wrote to memory of 376 2184 cmd.exe 98 PID 2184 wrote to memory of 376 2184 cmd.exe 98 PID 1512 wrote to memory of 4348 1512 AppLaunch.exe 106 PID 1512 wrote to memory of 4348 1512 AppLaunch.exe 106 PID 1512 wrote to memory of 4348 1512 AppLaunch.exe 106 PID 1512 wrote to memory of 2596 1512 AppLaunch.exe 108 PID 1512 wrote to memory of 2596 1512 AppLaunch.exe 108 PID 1512 wrote to memory of 2596 1512 AppLaunch.exe 108 PID 1512 wrote to memory of 5008 1512 AppLaunch.exe 110 PID 1512 wrote to memory of 5008 1512 AppLaunch.exe 110 PID 1512 wrote to memory of 5008 1512 AppLaunch.exe 110 PID 1512 wrote to memory of 2044 1512 AppLaunch.exe 112 PID 1512 wrote to memory of 2044 1512 AppLaunch.exe 112 PID 1512 wrote to memory of 2044 1512 AppLaunch.exe 112 PID 1512 wrote to memory of 2780 1512 AppLaunch.exe 114 PID 1512 wrote to memory of 2780 1512 AppLaunch.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\Full_Version\Sеtup.exe"C:\Users\Admin\AppData\Local\Temp\Full_Version\Sеtup.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Roaming\YyP3MrN3.exe"C:\Users\Admin\AppData\Roaming\YyP3MrN3.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:4348
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:2596
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5" /inheritance:e /deny "admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:5008
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "DocumentsSoftwareDistribution-type1.6.1.5\DocumentsSoftwareDistribution-type1.6.1.5" /TR "C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5\DocumentsSoftwareDistribution-type1.6.1.5.exe" /SC MINUTE4⤵
- Creates scheduled task(s)
PID:2044
-
-
C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5\DocumentsSoftwareDistribution-type1.6.1.5.exe"C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5\DocumentsSoftwareDistribution-type1.6.1.5.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Executes dropped EXE
PID:2780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\L1H2Kme8.exe"C:\Users\Admin\AppData\Local\Temp\L1H2Kme8.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\L1H2Kme8.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 04⤵PID:376
-
-
-
-
C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5\DocumentsSoftwareDistribution-type1.6.1.5.exeC:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5\DocumentsSoftwareDistribution-type1.6.1.5.exe1⤵
- Executes dropped EXE
PID:408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5\DocumentsSoftwareDistribution-type1.6.1.5.exe
Filesize578.8MB
MD5b4e4ae161af630a958001da6fd541ab7
SHA1d98da4dd3e30534573df647e4438a8733c01de05
SHA256a4cc23e3893253389e5b812679193ca8eb07fd6e31c722933ec5fb467e939d2e
SHA5122a5a65899d0ea65586708b13f2adf2d4816906be25d71527aac0a7eff71e16b9f06ef3d044c15e9736e9dcb18ce5be05985a81124b52b6eefc8ecec94172ae79
-
C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5\DocumentsSoftwareDistribution-type1.6.1.5.exe
Filesize602.2MB
MD5acbf3c2fc6ef74447dc6bd8e0aedba8f
SHA1c230b701330dfcb9cc938ae68c1caf4522566fb8
SHA256b7aeb4bbaddab221df36fa74e53c4fe1879efcbeb143f75d342f96ec13efe284
SHA512df8bcae6aba4402a68dca2b0d100b3fb41affa1dc854b373e6055d617152da2da51aee128e11be824cd38ef5b61e1b00736284a64d91f65dfc8f313d36481158
-
C:\ProgramData\DocumentsSoftwareDistribution-type1.6.1.5\DocumentsSoftwareDistribution-type1.6.1.5.exe
Filesize122.0MB
MD5b2cb57b5c8aeb20b9f13d8a4c16b9086
SHA11ca145f7209eb625d8d47c28cb90974cd7df54b7
SHA256d4fa3828568a4439680146657ed6cf74bae07d0ac86dfa4b642c4466da30d282
SHA512429167a203379845e1b08fdda978a256b6f51273827bf4fc600c2ce564fc86f1b70206f0275752ddb6fce5a234958e2ece117da8976f0e1dd7428cf5c46e4968
-
Filesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
Filesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
Filesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
Filesize
13.9MB
MD56dac8c5381ae3101d911145970bdde93
SHA104c1cbac48c640f3c54c0ec6086aa3eb181da696
SHA2566888c253f7fe673389ea592d69e1844c81eb01f313514df88f9dbdebad514aa8
SHA5121fc5b7de2f4033e2275ae01631006553e81ed0c541fdbfeee8533640e21e1033c324249a27861d85f0b07895df335fe5f013563da248a14ef6faa50ab4ad1610
-
Filesize
13.9MB
MD56dac8c5381ae3101d911145970bdde93
SHA104c1cbac48c640f3c54c0ec6086aa3eb181da696
SHA2566888c253f7fe673389ea592d69e1844c81eb01f313514df88f9dbdebad514aa8
SHA5121fc5b7de2f4033e2275ae01631006553e81ed0c541fdbfeee8533640e21e1033c324249a27861d85f0b07895df335fe5f013563da248a14ef6faa50ab4ad1610
-
Filesize
13.9MB
MD56dac8c5381ae3101d911145970bdde93
SHA104c1cbac48c640f3c54c0ec6086aa3eb181da696
SHA2566888c253f7fe673389ea592d69e1844c81eb01f313514df88f9dbdebad514aa8
SHA5121fc5b7de2f4033e2275ae01631006553e81ed0c541fdbfeee8533640e21e1033c324249a27861d85f0b07895df335fe5f013563da248a14ef6faa50ab4ad1610
-
Filesize
4.2MB
MD50a51d4ee447f46b430975af015602b6f
SHA1c40d02c130158ea41a844e120c52d4e674fd6b21
SHA25633c76186b77dba9b81efa63aa2d441dd5beeb892a8a28bb0ad27c06e2fa43322
SHA512a946ae0fba313a29d4a82793eade3095fa8522610d9f4f44aa1e2b3a3d4f82997c5744259998a22d502f4412fc3c1c6b916f6c7c1acd9a1778d94f66fbdaf1b7
-
Filesize
4.2MB
MD50a51d4ee447f46b430975af015602b6f
SHA1c40d02c130158ea41a844e120c52d4e674fd6b21
SHA25633c76186b77dba9b81efa63aa2d441dd5beeb892a8a28bb0ad27c06e2fa43322
SHA512a946ae0fba313a29d4a82793eade3095fa8522610d9f4f44aa1e2b3a3d4f82997c5744259998a22d502f4412fc3c1c6b916f6c7c1acd9a1778d94f66fbdaf1b7
-
Filesize
4.2MB
MD50a51d4ee447f46b430975af015602b6f
SHA1c40d02c130158ea41a844e120c52d4e674fd6b21
SHA25633c76186b77dba9b81efa63aa2d441dd5beeb892a8a28bb0ad27c06e2fa43322
SHA512a946ae0fba313a29d4a82793eade3095fa8522610d9f4f44aa1e2b3a3d4f82997c5744259998a22d502f4412fc3c1c6b916f6c7c1acd9a1778d94f66fbdaf1b7