Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
IMG_2031.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
IMG_2031.exe
Resource
win10v2004-20230220-en
General
-
Target
IMG_2031.exe
-
Size
816KB
-
MD5
1817e46e5a422e9132a04db8fec73a0c
-
SHA1
31c2f9de7b5b05cc322512fd9beadd7c7e525f6d
-
SHA256
60969a9175951613f2c83eab67e31887eaed9429e5d03cf8ab135131a2b47054
-
SHA512
b23c76bbf3ea1733cc4196d001a5034bf0b262bd683a26723076ce7ef653534461f9593bb0d70a037c0144695f12c4b371ffc26cde3bf69e1dcf2cc0f71eb712
-
SSDEEP
12288:oWmaQfFJeDYFPQC1nOw6/iZyubeDmFiFVVfHVpNtrjb+Vf7SJo7lfELkNCCtPzMI:NTCfJnGbDwKNd8H
Malware Config
Extracted
xworm
severdops.ddns.net:7021
eQLeuanC5v31k1hC
-
install_file
USB.exe
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation IMG_2031.exe -
Executes dropped EXE 1 IoCs
pid Process 4368 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" IMG_2031.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4368 set thread context of 3308 4368 svchost.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2220 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1308 timeout.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 3372 IMG_2031.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe 4368 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3372 IMG_2031.exe Token: SeDebugPrivilege 4368 svchost.exe Token: SeDebugPrivilege 3308 jsc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3372 wrote to memory of 212 3372 IMG_2031.exe 86 PID 3372 wrote to memory of 212 3372 IMG_2031.exe 86 PID 3372 wrote to memory of 4764 3372 IMG_2031.exe 88 PID 3372 wrote to memory of 4764 3372 IMG_2031.exe 88 PID 212 wrote to memory of 2220 212 cmd.exe 90 PID 212 wrote to memory of 2220 212 cmd.exe 90 PID 4764 wrote to memory of 1308 4764 cmd.exe 91 PID 4764 wrote to memory of 1308 4764 cmd.exe 91 PID 4764 wrote to memory of 4368 4764 cmd.exe 95 PID 4764 wrote to memory of 4368 4764 cmd.exe 95 PID 4368 wrote to memory of 4108 4368 svchost.exe 96 PID 4368 wrote to memory of 4108 4368 svchost.exe 96 PID 4368 wrote to memory of 628 4368 svchost.exe 97 PID 4368 wrote to memory of 628 4368 svchost.exe 97 PID 4368 wrote to memory of 2392 4368 svchost.exe 98 PID 4368 wrote to memory of 2392 4368 svchost.exe 98 PID 4368 wrote to memory of 5016 4368 svchost.exe 99 PID 4368 wrote to memory of 5016 4368 svchost.exe 99 PID 4368 wrote to memory of 1612 4368 svchost.exe 100 PID 4368 wrote to memory of 1612 4368 svchost.exe 100 PID 4368 wrote to memory of 5076 4368 svchost.exe 101 PID 4368 wrote to memory of 5076 4368 svchost.exe 101 PID 4368 wrote to memory of 2800 4368 svchost.exe 102 PID 4368 wrote to memory of 2800 4368 svchost.exe 102 PID 4368 wrote to memory of 4460 4368 svchost.exe 103 PID 4368 wrote to memory of 4460 4368 svchost.exe 103 PID 4368 wrote to memory of 4472 4368 svchost.exe 104 PID 4368 wrote to memory of 4472 4368 svchost.exe 104 PID 4368 wrote to memory of 3308 4368 svchost.exe 105 PID 4368 wrote to memory of 3308 4368 svchost.exe 105 PID 4368 wrote to memory of 3308 4368 svchost.exe 105 PID 4368 wrote to memory of 3308 4368 svchost.exe 105 PID 4368 wrote to memory of 3308 4368 svchost.exe 105 PID 4368 wrote to memory of 3308 4368 svchost.exe 105 PID 4368 wrote to memory of 3308 4368 svchost.exe 105 PID 4368 wrote to memory of 3308 4368 svchost.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG_2031.exe"C:\Users\Admin\AppData\Local\Temp\IMG_2031.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpADE8.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1308
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"4⤵PID:4108
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"4⤵PID:628
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"4⤵PID:2392
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"4⤵PID:5016
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"4⤵PID:1612
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"4⤵PID:5076
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"4⤵PID:2800
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"4⤵PID:4460
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"4⤵PID:4472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5e6182bdcd2ee9d7456011e2a72c5bce2
SHA104e3db5d557c8604a6fb4b983a5eed0d1e10d312
SHA2566dd0512027e650288029064459df606e039a0e0e226af3bdfcee136c1d392a1b
SHA512f80d747b9201a3a698978dbd8547d974c1c1175cb931ff08a270ff88cb782c52a136ee45097438624d69f255632a7e6e7de78d1a2b8ee81fdeb72da9ebe2942c
-
Filesize
816KB
MD51817e46e5a422e9132a04db8fec73a0c
SHA131c2f9de7b5b05cc322512fd9beadd7c7e525f6d
SHA25660969a9175951613f2c83eab67e31887eaed9429e5d03cf8ab135131a2b47054
SHA512b23c76bbf3ea1733cc4196d001a5034bf0b262bd683a26723076ce7ef653534461f9593bb0d70a037c0144695f12c4b371ffc26cde3bf69e1dcf2cc0f71eb712
-
Filesize
816KB
MD51817e46e5a422e9132a04db8fec73a0c
SHA131c2f9de7b5b05cc322512fd9beadd7c7e525f6d
SHA25660969a9175951613f2c83eab67e31887eaed9429e5d03cf8ab135131a2b47054
SHA512b23c76bbf3ea1733cc4196d001a5034bf0b262bd683a26723076ce7ef653534461f9593bb0d70a037c0144695f12c4b371ffc26cde3bf69e1dcf2cc0f71eb712