Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
图片20233155168jpg.cmd.exe
Resource
win7-20230220-en
General
-
Target
图片20233155168jpg.cmd.exe
-
Size
602KB
-
MD5
50e0dc8b208f29699d895388d2441cc0
-
SHA1
be4376a162f4f1a00da2124645e55301e641c440
-
SHA256
59c99ff6fe40a2d811eeebd5c63f5ddf96107a890cd6c4b41821adbcf97f9204
-
SHA512
8c29774e16686417fe6a552dfecb9ce2ee8d138c916f7f13b78dd974a10847b68f6fbb2452ab6a579e621ef66a47dda16b4ff8cc6d6a96bfcb1eff27bef4e1aa
-
SSDEEP
12288:DGHCnaomAEg3uPdkgOX+tZdxJsq1al2NyCGtN/NazPT46om5vGq:DGHCm8uPdJFdzakYBNazxoq
Malware Config
Signatures
-
Detects PlugX payload 26 IoCs
resource yara_rule behavioral2/memory/4584-153-0x0000000002460000-0x000000000248D000-memory.dmp family_plugx behavioral2/memory/4584-154-0x0000000002460000-0x000000000248D000-memory.dmp family_plugx behavioral2/memory/1504-173-0x0000000001100000-0x000000000112D000-memory.dmp family_plugx behavioral2/memory/1504-176-0x0000000001100000-0x000000000112D000-memory.dmp family_plugx behavioral2/memory/2316-178-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-179-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/2316-181-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-180-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-189-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-190-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-191-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-192-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-194-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-195-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-197-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1224-198-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/1504-199-0x0000000001100000-0x000000000112D000-memory.dmp family_plugx behavioral2/memory/3704-201-0x0000000002610000-0x000000000263D000-memory.dmp family_plugx behavioral2/memory/3704-203-0x0000000002610000-0x000000000263D000-memory.dmp family_plugx behavioral2/memory/3704-200-0x0000000002610000-0x000000000263D000-memory.dmp family_plugx behavioral2/memory/3704-205-0x0000000002610000-0x000000000263D000-memory.dmp family_plugx behavioral2/memory/3704-204-0x0000000002610000-0x000000000263D000-memory.dmp family_plugx behavioral2/memory/3704-206-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/3704-207-0x0000000002610000-0x000000000263D000-memory.dmp family_plugx behavioral2/memory/1224-208-0x0000000000C30000-0x0000000000C5D000-memory.dmp family_plugx behavioral2/memory/3704-210-0x0000000002610000-0x000000000263D000-memory.dmp family_plugx -
Blocklisted process makes network request 2 IoCs
flow pid Process 23 1224 msiexec.exe 25 1224 msiexec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 图片20233155168jpg.cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 4584 TraceIndexer.exe 1504 TraceIndexer.exe 2316 TraceIndexer.exe -
Loads dropped DLL 3 IoCs
pid Process 4584 TraceIndexer.exe 1504 TraceIndexer.exe 2316 TraceIndexer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHZ msiexec.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 34004400410045003500410032003800450042003600370041003400360030000000 msiexec.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1224 msiexec.exe 3704 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4584 TraceIndexer.exe 4584 TraceIndexer.exe 4584 TraceIndexer.exe 4584 TraceIndexer.exe 1504 TraceIndexer.exe 1504 TraceIndexer.exe 1224 msiexec.exe 1224 msiexec.exe 1224 msiexec.exe 1224 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 1224 msiexec.exe 3704 msiexec.exe 1224 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 1224 msiexec.exe 1224 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 1224 msiexec.exe 1224 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 1224 msiexec.exe 1224 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe 3704 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1224 msiexec.exe 3704 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4584 TraceIndexer.exe Token: SeTcbPrivilege 4584 TraceIndexer.exe Token: SeDebugPrivilege 1504 TraceIndexer.exe Token: SeTcbPrivilege 1504 TraceIndexer.exe Token: SeDebugPrivilege 2316 TraceIndexer.exe Token: SeTcbPrivilege 2316 TraceIndexer.exe Token: SeDebugPrivilege 1224 msiexec.exe Token: SeTcbPrivilege 1224 msiexec.exe Token: SeDebugPrivilege 3704 msiexec.exe Token: SeTcbPrivilege 3704 msiexec.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4756 wrote to memory of 4584 4756 图片20233155168jpg.cmd.exe 84 PID 4756 wrote to memory of 4584 4756 图片20233155168jpg.cmd.exe 84 PID 4756 wrote to memory of 4584 4756 图片20233155168jpg.cmd.exe 84 PID 2316 wrote to memory of 1224 2316 TraceIndexer.exe 90 PID 2316 wrote to memory of 1224 2316 TraceIndexer.exe 90 PID 2316 wrote to memory of 1224 2316 TraceIndexer.exe 90 PID 2316 wrote to memory of 1224 2316 TraceIndexer.exe 90 PID 2316 wrote to memory of 1224 2316 TraceIndexer.exe 90 PID 2316 wrote to memory of 1224 2316 TraceIndexer.exe 90 PID 2316 wrote to memory of 1224 2316 TraceIndexer.exe 90 PID 2316 wrote to memory of 1224 2316 TraceIndexer.exe 90 PID 1224 wrote to memory of 3704 1224 msiexec.exe 91 PID 1224 wrote to memory of 3704 1224 msiexec.exe 91 PID 1224 wrote to memory of 3704 1224 msiexec.exe 91 PID 1224 wrote to memory of 3704 1224 msiexec.exe 91 PID 1224 wrote to memory of 3704 1224 msiexec.exe 91 PID 1224 wrote to memory of 3704 1224 msiexec.exe 91 PID 1224 wrote to memory of 3704 1224 msiexec.exe 91 PID 1224 wrote to memory of 3704 1224 msiexec.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\图片20233155168jpg.cmd.exe"C:\Users\Admin\AppData\Local\Temp\图片20233155168jpg.cmd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\TraceIndexer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\TraceIndexer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\ProgramData\googleupdate\TraceIndexer.exe"C:\ProgramData\googleupdate\TraceIndexer.exe" 100 45841⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
C:\ProgramData\googleupdate\TraceIndexer.exe"C:\ProgramData\googleupdate\TraceIndexer.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 201 02⤵
- Blocklisted process makes network request
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 12243⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
113KB
MD596237e8adaff3cb27fc02b5cc2a817b7
SHA16c5a43e26a30b401e5657c56eb8a0fbfe9916859
SHA256ab112d5d3b66116293eb4205fdf778d34f90b1e27b020c2cad65e551d16b483f
SHA512b53346c08e45d75bbae5ef863c5ecc4a340073a9c550122792fd407708534201a7aefd2366b9c825bdff6ed105953371729bf0903a8152093403165ff9098c8c
-
Filesize
113KB
MD596237e8adaff3cb27fc02b5cc2a817b7
SHA16c5a43e26a30b401e5657c56eb8a0fbfe9916859
SHA256ab112d5d3b66116293eb4205fdf778d34f90b1e27b020c2cad65e551d16b483f
SHA512b53346c08e45d75bbae5ef863c5ecc4a340073a9c550122792fd407708534201a7aefd2366b9c825bdff6ed105953371729bf0903a8152093403165ff9098c8c
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
113KB
MD596237e8adaff3cb27fc02b5cc2a817b7
SHA16c5a43e26a30b401e5657c56eb8a0fbfe9916859
SHA256ab112d5d3b66116293eb4205fdf778d34f90b1e27b020c2cad65e551d16b483f
SHA512b53346c08e45d75bbae5ef863c5ecc4a340073a9c550122792fd407708534201a7aefd2366b9c825bdff6ed105953371729bf0903a8152093403165ff9098c8c