Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    200s
  • max time network
    262s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:40

General

  • Target

    d7ecc77fb330483a2476248bb25d8219db463a7182454fbb606e5494d1457801.exe

  • Size

    1.6MB

  • MD5

    85e033ca4bc37615bf9a6c6dc5548332

  • SHA1

    c0ec6637a179346bc40cc5de9a2b8be92a6a9e37

  • SHA256

    d7ecc77fb330483a2476248bb25d8219db463a7182454fbb606e5494d1457801

  • SHA512

    d29e1b302efaff4475c5a4073bbc282c76bba5a92d0710199570ded64e8ae6c316a779da8b8f1d1ee309bcbe88deb23b2f7345fc31cbe013bf4aca438d610352

  • SSDEEP

    24576:pyoKVybX0pdyK3MFmJ606yz2OstwF6SpAudBXsTEP7h3XC6WuWifpVFTS6zGOdW2:coYp8FZFc27tS6vKX/93XVW9SVFTSEG

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7ecc77fb330483a2476248bb25d8219db463a7182454fbb606e5494d1457801.exe
    "C:\Users\Admin\AppData\Local\Temp\d7ecc77fb330483a2476248bb25d8219db463a7182454fbb606e5494d1457801.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vi998769.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vi998769.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hS680229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hS680229.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PU271929.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PU271929.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3948
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zu565213.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zu565213.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1348
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a90847933.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a90847933.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:216
              • C:\Windows\Temp\1.exe
                "C:\Windows\Temp\1.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2124
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b20297605.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b20297605.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3096
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 1088
                7⤵
                • Program crash
                PID:4384
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3096 -ip 3096
    1⤵
      PID:4876

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vi998769.exe

      Filesize

      1.3MB

      MD5

      0c1669a88506c7abeece771f9f5dff8a

      SHA1

      274d294ff359ba973174e5caec72936c5cc8fb28

      SHA256

      9dc8f591de1a869b7d8ffdc90dc1ca4a5ac60f23a200ddaeac5baf7a06fb4837

      SHA512

      6253c7fa0a898ee771e01219a3a790c8919b1a1935cc8acde01f929854d3df3f93fe2f9bc15f0758b3b6c1ae5cd8b3fe6cb4c09fc11c21e1367ac1b3a80e4176

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vi998769.exe

      Filesize

      1.3MB

      MD5

      0c1669a88506c7abeece771f9f5dff8a

      SHA1

      274d294ff359ba973174e5caec72936c5cc8fb28

      SHA256

      9dc8f591de1a869b7d8ffdc90dc1ca4a5ac60f23a200ddaeac5baf7a06fb4837

      SHA512

      6253c7fa0a898ee771e01219a3a790c8919b1a1935cc8acde01f929854d3df3f93fe2f9bc15f0758b3b6c1ae5cd8b3fe6cb4c09fc11c21e1367ac1b3a80e4176

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hS680229.exe

      Filesize

      1.2MB

      MD5

      817a1885ecd3b4edba63e8d519ab50ee

      SHA1

      29759fff3e5cd9ff2298c5adea71c562d6bb96ca

      SHA256

      e4e7f95c6539ee4fe93013d7332b4b61fb018978a2f28cfc3cfbf5580cafe996

      SHA512

      5d53d7a5b0e7d26ef1cfc579526af0d361319a24340e65320a1d361ea40989bd82bccd381b6c579aa28a6ef20be7fa930131ea2dc889df2238e07bafe9d1aa1a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hS680229.exe

      Filesize

      1.2MB

      MD5

      817a1885ecd3b4edba63e8d519ab50ee

      SHA1

      29759fff3e5cd9ff2298c5adea71c562d6bb96ca

      SHA256

      e4e7f95c6539ee4fe93013d7332b4b61fb018978a2f28cfc3cfbf5580cafe996

      SHA512

      5d53d7a5b0e7d26ef1cfc579526af0d361319a24340e65320a1d361ea40989bd82bccd381b6c579aa28a6ef20be7fa930131ea2dc889df2238e07bafe9d1aa1a

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PU271929.exe

      Filesize

      726KB

      MD5

      ab22e2979aaaff6196c2269fe3f4458d

      SHA1

      7055df850138a5568e0ba76a32aaf2b1d7a2cbae

      SHA256

      6390140171e06d8085cb96cc384006ac5a3998529664a441e479efb9d83e9a60

      SHA512

      04ff14e3b98caaa8d07c9a4d9349c8e67399cf3368594b41013ca8f42796d4a60b5613117ab28846fb4e8dbbcdc6466ef32d8757563932c2de1682ffa0626b97

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\PU271929.exe

      Filesize

      726KB

      MD5

      ab22e2979aaaff6196c2269fe3f4458d

      SHA1

      7055df850138a5568e0ba76a32aaf2b1d7a2cbae

      SHA256

      6390140171e06d8085cb96cc384006ac5a3998529664a441e479efb9d83e9a60

      SHA512

      04ff14e3b98caaa8d07c9a4d9349c8e67399cf3368594b41013ca8f42796d4a60b5613117ab28846fb4e8dbbcdc6466ef32d8757563932c2de1682ffa0626b97

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zu565213.exe

      Filesize

      554KB

      MD5

      4e2ccace82aad23276554d8f0d434a4e

      SHA1

      a82a50fe163b24fb456c05082533dc7c38aa877e

      SHA256

      a48310d68e346d99dc453accf1c33a3ba55c465a62dd25c3454b6f58f66724e0

      SHA512

      26bc17d3706cbde5e58e6452aa895dc23922f2619b4f1781cd2abf21352821fc7712ef187bc2c2ff369ff7b96ca1eee734a5ee3e3a5e0f934cda6192ce89d70a

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\zu565213.exe

      Filesize

      554KB

      MD5

      4e2ccace82aad23276554d8f0d434a4e

      SHA1

      a82a50fe163b24fb456c05082533dc7c38aa877e

      SHA256

      a48310d68e346d99dc453accf1c33a3ba55c465a62dd25c3454b6f58f66724e0

      SHA512

      26bc17d3706cbde5e58e6452aa895dc23922f2619b4f1781cd2abf21352821fc7712ef187bc2c2ff369ff7b96ca1eee734a5ee3e3a5e0f934cda6192ce89d70a

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a90847933.exe

      Filesize

      303KB

      MD5

      49ee4cd1a4d67d923faa507ff5b40e68

      SHA1

      ee8a85baf008007ea64fda5c7598ef568015383d

      SHA256

      cfb02bac79546f2a87595b63d7208d7c6d3fe756e167dcb48a020aa5dea824dd

      SHA512

      c0a44cecc52e50d5a11a476042bb7d7150bd19f97c14c4b847926fc43b14a109b184abf455cb60bb9f5628c0947011917b20ae640bbc2a34d92feaffe6e5d13d

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a90847933.exe

      Filesize

      303KB

      MD5

      49ee4cd1a4d67d923faa507ff5b40e68

      SHA1

      ee8a85baf008007ea64fda5c7598ef568015383d

      SHA256

      cfb02bac79546f2a87595b63d7208d7c6d3fe756e167dcb48a020aa5dea824dd

      SHA512

      c0a44cecc52e50d5a11a476042bb7d7150bd19f97c14c4b847926fc43b14a109b184abf455cb60bb9f5628c0947011917b20ae640bbc2a34d92feaffe6e5d13d

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b20297605.exe

      Filesize

      391KB

      MD5

      18a7b3e4a6f6ac7ab3ffe3f10133c7c4

      SHA1

      0ba3dc45fd7b9f6b5554ba64da17c543b2a7ca8e

      SHA256

      c6e16c69d3e02cbb4c8a6f3ba36c9b66a1ab9a2002f00120d94dbea5366f9d78

      SHA512

      abff24c719470879c813b5dd03fa8e8432b8f67b91788e605ced0891d4d2f09d4f3473ba060ed57283a1a20d40c444e775e6b0aa6303b7b1cf0d3aae4e1b2b78

    • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b20297605.exe

      Filesize

      391KB

      MD5

      18a7b3e4a6f6ac7ab3ffe3f10133c7c4

      SHA1

      0ba3dc45fd7b9f6b5554ba64da17c543b2a7ca8e

      SHA256

      c6e16c69d3e02cbb4c8a6f3ba36c9b66a1ab9a2002f00120d94dbea5366f9d78

      SHA512

      abff24c719470879c813b5dd03fa8e8432b8f67b91788e605ced0891d4d2f09d4f3473ba060ed57283a1a20d40c444e775e6b0aa6303b7b1cf0d3aae4e1b2b78

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Windows\Temp\1.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • memory/216-190-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-206-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-170-0x00000000049A0000-0x00000000049B0000-memory.dmp

      Filesize

      64KB

    • memory/216-171-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-172-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-174-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-176-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-178-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-180-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-182-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-184-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-186-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-188-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-168-0x00000000049B0000-0x0000000004F54000-memory.dmp

      Filesize

      5.6MB

    • memory/216-192-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-194-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-196-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-198-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-200-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-202-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-204-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-169-0x00000000049A0000-0x00000000049B0000-memory.dmp

      Filesize

      64KB

    • memory/216-208-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-210-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-212-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-214-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-216-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-218-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-220-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-222-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-224-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-226-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-228-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-230-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-232-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-234-0x0000000004F70000-0x0000000004FC1000-memory.dmp

      Filesize

      324KB

    • memory/216-2300-0x00000000049A0000-0x00000000049B0000-memory.dmp

      Filesize

      64KB

    • memory/2124-2312-0x0000000000380000-0x000000000038A000-memory.dmp

      Filesize

      40KB

    • memory/3096-2345-0x00000000008E0000-0x000000000090D000-memory.dmp

      Filesize

      180KB

    • memory/3096-2346-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

      Filesize

      64KB

    • memory/3096-2347-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

      Filesize

      64KB

    • memory/3096-2348-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

      Filesize

      64KB

    • memory/3096-2350-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

      Filesize

      64KB

    • memory/3096-2351-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

      Filesize

      64KB