Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
clifdthjsjkdgaoker.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
clifdthjsjkdgaoker.exe
Resource
win10v2004-20230220-en
General
-
Target
clifdthjsjkdgaoker.exe
-
Size
7.5MB
-
MD5
fb0deff37fe12bbc4f0c1fe21e2d15ef
-
SHA1
180325b8b6e64638e167601c67cd9c53331ba9f6
-
SHA256
ece100b8240f7eb032cb319a019eba1552ac19f563a291cf8422b1090ccf9b76
-
SHA512
9fc013111994e943fd800abeb543563713eebebcd940b28973809a40d85271f0ed781dd95ca508e55788de2e2a575b1cb8734636f15b51a9d68f773b2cb4e73d
-
SSDEEP
196608:bdj1WcTeKCVpVAKegYv6Pvz7xCVfQeYDprOtpN6x1Cd:RReKaAlRgxMfvihOwxy
Malware Config
Extracted
laplas
http://185.174.137.94
-
api_key
b54641cc29f95948635d659de94166b4528e39706396a99bb9c54497b2ee3421
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation clifdthjsjkdgaoker.exe -
Executes dropped EXE 1 IoCs
pid Process 1824 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" clifdthjsjkdgaoker.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1664 clifdthjsjkdgaoker.exe 1664 clifdthjsjkdgaoker.exe 1824 svcservice.exe 1824 svcservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1664 clifdthjsjkdgaoker.exe 1664 clifdthjsjkdgaoker.exe 1664 clifdthjsjkdgaoker.exe 1664 clifdthjsjkdgaoker.exe 1824 svcservice.exe 1824 svcservice.exe 1824 svcservice.exe 1824 svcservice.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1824 1664 clifdthjsjkdgaoker.exe 89 PID 1664 wrote to memory of 1824 1664 clifdthjsjkdgaoker.exe 89 PID 1664 wrote to memory of 1824 1664 clifdthjsjkdgaoker.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\clifdthjsjkdgaoker.exe"C:\Users\Admin\AppData\Local\Temp\clifdthjsjkdgaoker.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
687.0MB
MD541145eabaec3da676f64f9b297114b61
SHA1c6fe16d87752662a6549421be044c921952a312a
SHA25636d35f748fc9250bbc216d14e3b82fc3aaf24461330ca6c13271a9ab3a2ad98f
SHA512f74c52aff79988760195fd52735316d428ecbd1def7d0b02032a08e82a2d8066e71f15b54e149c284ad18e498c6a8b5f01ffb8af6db6b7b6fd2c3d759290af41
-
Filesize
478.1MB
MD5f064405d33e11f7143735015c22dbde0
SHA1a1342923aa918aa121c7c2c0703e4dcd62fec473
SHA256b69fb7a0e464fbaaf8263a3eea5bf9d293c952f7b831a3463aa7d47e99724aff
SHA5123d929584ce8c45c3357f7ae59a9d0d08a77a02cb716d90f1b592895ea8026ecc123cab59a82c67b831ad4373fad371ffad03d013e8ee7c6492070bf24bfa16be
-
Filesize
562.6MB
MD5c3bd4a092e396137493c0f1afbc905d5
SHA108353b53ec2da088d27407fb0a5df437e7dbb1f5
SHA25605de60648875b1a267e54d7218246148cbebec8ab973a9dd1fbdcf14d36fede1
SHA512faff5324b377c5c02854f89033119e58c800091f5f86d127fc88000881e2307026ac6826c280f3006bc3e46fc2a7ccb4633002c51f5ed1ed9a45df83987dfb61