Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1plugx/4094...ba.exe
windows7-x64
7plugx/4094...ba.exe
windows10-2004-x64
7plugx/5a94...11.exe
windows7-x64
1plugx/5a94...11.exe
windows10-2004-x64
1plugx/8df2...43.exe
windows7-x64
10plugx/8df2...43.exe
windows10-2004-x64
10plugx/9aff...0d.exe
windows7-x64
1plugx/9aff...0d.exe
windows10-2004-x64
1plugx/a2a0...5d.exe
windows7-x64
1plugx/a2a0...5d.exe
windows10-2004-x64
1plugx/a8e2...a3.exe
windows7-x64
10plugx/a8e2...a3.exe
windows10-2004-x64
10plugx/ac75...f2.exe
windows7-x64
7plugx/ac75...f2.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
plugx/4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
plugx/4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
plugx/5a9468a87997f2363995e264505105f6a235b66543bb28635fb74f78704e9111.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
plugx/5a9468a87997f2363995e264505105f6a235b66543bb28635fb74f78704e9111.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
plugx/8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
plugx/8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
plugx/9aff1e12a1b447ca8ab3076f684716a859c906f9b2d0e870d59d0f06fc548d0d.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
plugx/9aff1e12a1b447ca8ab3076f684716a859c906f9b2d0e870d59d0f06fc548d0d.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
plugx/a2a0ce67c239385c1ec1d5d29ff91a7daf91cf2b4368dc91d84dbb598becdc5d.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
plugx/a2a0ce67c239385c1ec1d5d29ff91a7daf91cf2b4368dc91d84dbb598becdc5d.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
plugx/a8e2b38c576bf19f6b0bed69c85c2a64445337087257cf566388f7b0d6d583a3.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
plugx/a8e2b38c576bf19f6b0bed69c85c2a64445337087257cf566388f7b0d6d583a3.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
plugx/ac758e6ad91120d1c98248ed2582c1ab472d83ef354f9c4b2f62167a699565f2.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
plugx/ac758e6ad91120d1c98248ed2582c1ab472d83ef354f9c4b2f62167a699565f2.exe
Resource
win10v2004-20230220-en
General
-
Target
plugx/4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe
-
Size
665KB
-
MD5
6741ad202dcef693dceb98b0a10c49fc
-
SHA1
b1e8ba2c12908c338a1b38c61cc7dab17015bd01
-
SHA256
4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba
-
SHA512
1a6f82a5ea41d72b1493ab5cf358249b8018e4cdebe15d6a2f63e202a092779a5f40647bac0b0f9d8556383160b82add9a6205a84aaf43eeb30922761a034f49
-
SSDEEP
12288:n1IIZygwpE/1UZyMYUkUJIh8E2tFNgw/nK6iUDbD/W/TQ2Y6s/z:nuIIgN1UZp/Ja52tEKnK6pfKLQ2Y6s7
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0007000000023117-150.dat aspack_v212_v242 behavioral2/files/0x0007000000023117-157.dat aspack_v212_v242 behavioral2/files/0x0007000000023117-158.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe -
Executes dropped EXE 5 IoCs
pid Process 1464 maze-game.exe 1868 mazegame.exe 2092 ctfmno.exe 4832 SxS.exe 4416 SxS.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 61.139.2.69 Destination IP 61.139.2.69 Destination IP 202.98.96.68 Destination IP 202.98.96.68 Destination IP 205.252.144.228 Destination IP 61.139.2.69 Destination IP 61.139.2.69 Destination IP 205.252.144.228 Destination IP 202.98.96.68 Destination IP 205.252.144.228 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5104 2092 WerFault.exe 84 -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 44003600450038003700350030003700300033004500380046003800340037000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3680 svchost.exe 3680 svchost.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3680 svchost.exe 3680 svchost.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3680 svchost.exe 3680 svchost.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3680 svchost.exe 3680 svchost.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3680 svchost.exe 3680 svchost.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3292 msiexec.exe 3680 svchost.exe 3680 svchost.exe 3292 msiexec.exe 3292 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1868 mazegame.exe Token: SeTcbPrivilege 1868 mazegame.exe Token: SeDebugPrivilege 4832 SxS.exe Token: SeTcbPrivilege 4832 SxS.exe Token: SeDebugPrivilege 4416 SxS.exe Token: SeTcbPrivilege 4416 SxS.exe Token: SeDebugPrivilege 3680 svchost.exe Token: SeTcbPrivilege 3680 svchost.exe Token: SeDebugPrivilege 3292 msiexec.exe Token: SeTcbPrivilege 3292 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4708 wrote to memory of 1464 4708 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe 82 PID 4708 wrote to memory of 1464 4708 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe 82 PID 4708 wrote to memory of 1464 4708 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe 82 PID 4708 wrote to memory of 1868 4708 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe 83 PID 4708 wrote to memory of 1868 4708 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe 83 PID 4708 wrote to memory of 1868 4708 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe 83 PID 4708 wrote to memory of 2092 4708 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe 84 PID 4708 wrote to memory of 2092 4708 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe 84 PID 4708 wrote to memory of 2092 4708 4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe 84 PID 1868 wrote to memory of 4832 1868 mazegame.exe 85 PID 1868 wrote to memory of 4832 1868 mazegame.exe 85 PID 1868 wrote to memory of 4832 1868 mazegame.exe 85 PID 4416 wrote to memory of 3680 4416 SxS.exe 89 PID 4416 wrote to memory of 3680 4416 SxS.exe 89 PID 4416 wrote to memory of 3680 4416 SxS.exe 89 PID 4416 wrote to memory of 3680 4416 SxS.exe 89 PID 4416 wrote to memory of 3680 4416 SxS.exe 89 PID 4416 wrote to memory of 3680 4416 SxS.exe 89 PID 4416 wrote to memory of 3680 4416 SxS.exe 89 PID 4416 wrote to memory of 3680 4416 SxS.exe 89 PID 3680 wrote to memory of 3292 3680 svchost.exe 91 PID 3680 wrote to memory of 3292 3680 svchost.exe 91 PID 3680 wrote to memory of 3292 3680 svchost.exe 91 PID 3680 wrote to memory of 3292 3680 svchost.exe 91 PID 3680 wrote to memory of 3292 3680 svchost.exe 91 PID 3680 wrote to memory of 3292 3680 svchost.exe 91 PID 3680 wrote to memory of 3292 3680 svchost.exe 91 PID 3680 wrote to memory of 3292 3680 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\plugx\4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe"C:\Users\Admin\AppData\Local\Temp\plugx\4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\maze-game.exe"C:\Users\Admin\AppData\Local\Temp\maze-game.exe"2⤵
- Executes dropped EXE
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\mazegame.exe"C:\Users\Admin\AppData\Local\Temp\mazegame.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\ProgramData\Microsoft PA\SxS.exe"C:\ProgramData\Microsoft PA\SxS.exe" 100 18683⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
C:\Users\Admin\AppData\Local\Temp\ctfmno.exe"C:\Users\Admin\AppData\Local\Temp\ctfmno.exe"2⤵
- Executes dropped EXE
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 2283⤵
- Program crash
PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2092 -ip 20921⤵PID:4936
-
C:\ProgramData\Microsoft PA\SxS.exe"C:\ProgramData\Microsoft PA\SxS.exe" 200 01⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 300 36803⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD5b9932e02979acc7f4052362925484223
SHA1483920d4c81f3383a01e76ca8c21f8eaed728d03
SHA2568769beb0878f1a283749477d74aa817c33b00f01eb7f5b5ca2024753a8222ab5
SHA5126a0776de45e58bc685b998cd4e769b4a4f2d95b84ee5a5b42e7f502e36b14dff0231dfe797a81c5e1d292d2b7217c1823214c2b3799cb288c3c744bc1834f488
-
Filesize
146KB
MD5b9932e02979acc7f4052362925484223
SHA1483920d4c81f3383a01e76ca8c21f8eaed728d03
SHA2568769beb0878f1a283749477d74aa817c33b00f01eb7f5b5ca2024753a8222ab5
SHA5126a0776de45e58bc685b998cd4e769b4a4f2d95b84ee5a5b42e7f502e36b14dff0231dfe797a81c5e1d292d2b7217c1823214c2b3799cb288c3c744bc1834f488
-
Filesize
146KB
MD5b9932e02979acc7f4052362925484223
SHA1483920d4c81f3383a01e76ca8c21f8eaed728d03
SHA2568769beb0878f1a283749477d74aa817c33b00f01eb7f5b5ca2024753a8222ab5
SHA5126a0776de45e58bc685b998cd4e769b4a4f2d95b84ee5a5b42e7f502e36b14dff0231dfe797a81c5e1d292d2b7217c1823214c2b3799cb288c3c744bc1834f488
-
Filesize
9KB
MD56d5522331c533a6634d975f25f915530
SHA1baaefe3b88830bca380721dfa3e57967788f3423
SHA2566595dbbb8d327d766cdb0228d6f4ac6a8ff1320884c54caf9ca4ee0b4845c6d8
SHA5124d509c768d4d90957a04e285c31dc8f4083403d650bf0215b0af445b20a9941624bb0aaa54a999da57c56c21ef87930b2d4ab54a0c9063a0f0a7ce0f67aca7db
-
Filesize
9KB
MD56d5522331c533a6634d975f25f915530
SHA1baaefe3b88830bca380721dfa3e57967788f3423
SHA2566595dbbb8d327d766cdb0228d6f4ac6a8ff1320884c54caf9ca4ee0b4845c6d8
SHA5124d509c768d4d90957a04e285c31dc8f4083403d650bf0215b0af445b20a9941624bb0aaa54a999da57c56c21ef87930b2d4ab54a0c9063a0f0a7ce0f67aca7db
-
Filesize
9KB
MD56d5522331c533a6634d975f25f915530
SHA1baaefe3b88830bca380721dfa3e57967788f3423
SHA2566595dbbb8d327d766cdb0228d6f4ac6a8ff1320884c54caf9ca4ee0b4845c6d8
SHA5124d509c768d4d90957a04e285c31dc8f4083403d650bf0215b0af445b20a9941624bb0aaa54a999da57c56c21ef87930b2d4ab54a0c9063a0f0a7ce0f67aca7db
-
Filesize
458KB
MD5469d266169ab4c2604c712c472b75bd7
SHA155f62b009ea046f5116a900b716eb3e432b3bf3d
SHA256038f458a2389182590abfc557e02f423533a564e110f9fc72af6a47d1d162fd7
SHA5122560d2a1cdacc6554a1202057c3d9bad5aee3d1cdfc1b254ec5160e81189cb4a22031d0b54704dd5abbe1323c0e4468e78196f093bae55c40aa38b03b011b898
-
Filesize
458KB
MD5469d266169ab4c2604c712c472b75bd7
SHA155f62b009ea046f5116a900b716eb3e432b3bf3d
SHA256038f458a2389182590abfc557e02f423533a564e110f9fc72af6a47d1d162fd7
SHA5122560d2a1cdacc6554a1202057c3d9bad5aee3d1cdfc1b254ec5160e81189cb4a22031d0b54704dd5abbe1323c0e4468e78196f093bae55c40aa38b03b011b898
-
Filesize
458KB
MD5469d266169ab4c2604c712c472b75bd7
SHA155f62b009ea046f5116a900b716eb3e432b3bf3d
SHA256038f458a2389182590abfc557e02f423533a564e110f9fc72af6a47d1d162fd7
SHA5122560d2a1cdacc6554a1202057c3d9bad5aee3d1cdfc1b254ec5160e81189cb4a22031d0b54704dd5abbe1323c0e4468e78196f093bae55c40aa38b03b011b898
-
Filesize
146KB
MD5b9932e02979acc7f4052362925484223
SHA1483920d4c81f3383a01e76ca8c21f8eaed728d03
SHA2568769beb0878f1a283749477d74aa817c33b00f01eb7f5b5ca2024753a8222ab5
SHA5126a0776de45e58bc685b998cd4e769b4a4f2d95b84ee5a5b42e7f502e36b14dff0231dfe797a81c5e1d292d2b7217c1823214c2b3799cb288c3c744bc1834f488
-
Filesize
146KB
MD5b9932e02979acc7f4052362925484223
SHA1483920d4c81f3383a01e76ca8c21f8eaed728d03
SHA2568769beb0878f1a283749477d74aa817c33b00f01eb7f5b5ca2024753a8222ab5
SHA5126a0776de45e58bc685b998cd4e769b4a4f2d95b84ee5a5b42e7f502e36b14dff0231dfe797a81c5e1d292d2b7217c1823214c2b3799cb288c3c744bc1834f488
-
Filesize
146KB
MD5b9932e02979acc7f4052362925484223
SHA1483920d4c81f3383a01e76ca8c21f8eaed728d03
SHA2568769beb0878f1a283749477d74aa817c33b00f01eb7f5b5ca2024753a8222ab5
SHA5126a0776de45e58bc685b998cd4e769b4a4f2d95b84ee5a5b42e7f502e36b14dff0231dfe797a81c5e1d292d2b7217c1823214c2b3799cb288c3c744bc1834f488