Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    251s
  • max time network
    255s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    15/06/2023, 19:40

Errors

Reason
Machine shutdown

General

  • Target

    Fact_digital_SerieA3548510694BSMULRBDPLatksj.exe

  • Size

    248.3MB

  • MD5

    4bc1ec0fe883af3a84a07a383f51695e

  • SHA1

    86092d7158be3000924f82911de5edb19de8141c

  • SHA256

    e07dd6c0c929cc8c6fb1c379e272a458776c5bbb2a3963c0baf5b2a71b53d079

  • SHA512

    85a64eb4cbe7c387c14b7e3951a8428ecb6e8516fdacdc0b2bfaecf30a5d91b963db23fd6fdd93c630413ab1896e1befa548c8f2a652025843eb22e7ae18d3e4

  • SSDEEP

    98304:qfIAyucjzAPt/4nFtbO8ZXaMxjR3zm737wOOAsGywW1UrttJjUI+:oIAy70/KXaMhxM7TXASttJo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fact_digital_SerieA3548510694BSMULRBDPLatksj.exe
    "C:\Users\Admin\AppData\Local\Temp\Fact_digital_SerieA3548510694BSMULRBDPLatksj.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\ProgramData\xoiqbEssentialDriverDetect\xoibDriverMaintenanceProvkTouchMaster.exe
      "C:\ProgramData\xoiqbEssentialDriverDetect\xoibDriverMaintenanceProvkTouchMaster.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C powershell.exe -Command ""Set-ItemProperty -Path HKLM:\Software\Microsoft\Windows\CurrentVersion\Run -Name AMDDigitalSyncH#(31#D8=3 -Value 'C:\ProgramData\xoiqbEssentialDriverDetect\xoibDriverMaintenanceProvkTouchMaster.exe /runas'""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command ""Set-ItemProperty -Path HKLM:\Software\Microsoft\Windows\CurrentVersion\Run -Name AMDDigitalSyncH#(31#D8=3 -Value 'C:\ProgramData\xoiqbEssentialDriverDetect\xoibDriverMaintenanceProvkTouchMaster.exe /runas'""
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4936
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39fa855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:5080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\xoiqbEssentialDriverDetect\xoibDriverMaintenanceProvkTouchMaster.exe

    Filesize

    318.8MB

    MD5

    58008d537956c1ffab3f46262560bc4e

    SHA1

    44f2760720f4dd6a25ef12531cc7c29b9d864c94

    SHA256

    95811fe68abd63cedd62336124c1a650eecf5d6377b8313227b0a581934cc391

    SHA512

    f0006328ee46b9da4917ef07982d50fbba9618d6b8bf9c857072141294455cdf6d09196ed896fe3e9c05f57e2468cf8c618e81e265af0148b5090a689ecdce87

  • C:\ProgramData\xoiqbEssentialDriverDetect\xoibDriverMaintenanceProvkTouchMaster.exe

    Filesize

    318.8MB

    MD5

    58008d537956c1ffab3f46262560bc4e

    SHA1

    44f2760720f4dd6a25ef12531cc7c29b9d864c94

    SHA256

    95811fe68abd63cedd62336124c1a650eecf5d6377b8313227b0a581934cc391

    SHA512

    f0006328ee46b9da4917ef07982d50fbba9618d6b8bf9c857072141294455cdf6d09196ed896fe3e9c05f57e2468cf8c618e81e265af0148b5090a689ecdce87

  • C:\ProgramData\xoiqbEssentialDriverDetect\xoibDriverMaintenanceProvkTouchMaster.exe

    Filesize

    318.8MB

    MD5

    58008d537956c1ffab3f46262560bc4e

    SHA1

    44f2760720f4dd6a25ef12531cc7c29b9d864c94

    SHA256

    95811fe68abd63cedd62336124c1a650eecf5d6377b8313227b0a581934cc391

    SHA512

    f0006328ee46b9da4917ef07982d50fbba9618d6b8bf9c857072141294455cdf6d09196ed896fe3e9c05f57e2468cf8c618e81e265af0148b5090a689ecdce87

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1mbjgthj.0fp.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Public\xoiqbEssentialDriverDetect\kbvoQevireZnvagranaprCebixGbhpuZnfgre.cfg

    Filesize

    332B

    MD5

    37acf90e8c38228f0531ee835830c4b1

    SHA1

    63c03f4875e79d9e190c6d6448e95939b56eff50

    SHA256

    bdd3d1e093277012d644023516cb6ccf776301f82e0fce0b0aa182c4c2fbf5cb

    SHA512

    0a54ee07f9c2c6410df41383bb5785e430053f7e28dc2fb7563e6259d4ff6cf5139c94d118001b268b340f187cab155b0f4c07cb04fa80d5a6cf1a17c13aba4b

  • memory/2896-145-0x0000000000FB0000-0x0000000001FB0000-memory.dmp

    Filesize

    16.0MB

  • memory/2896-137-0x0000000000FB0000-0x0000000001FB0000-memory.dmp

    Filesize

    16.0MB

  • memory/2896-136-0x0000000000FB0000-0x0000000001FB0000-memory.dmp

    Filesize

    16.0MB

  • memory/2896-134-0x0000000000FB0000-0x0000000001FB0000-memory.dmp

    Filesize

    16.0MB

  • memory/2896-155-0x0000000000FB0000-0x0000000001FB0000-memory.dmp

    Filesize

    16.0MB

  • memory/2896-218-0x0000000000FB0000-0x0000000001FB0000-memory.dmp

    Filesize

    16.0MB

  • memory/2896-159-0x0000000000FB0000-0x0000000001FB0000-memory.dmp

    Filesize

    16.0MB

  • memory/2896-133-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

    Filesize

    4KB

  • memory/2896-203-0x0000000000FB0000-0x0000000001FB0000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-215-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-227-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-201-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-162-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-211-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-213-0x0000000014E40000-0x0000000014E41000-memory.dmp

    Filesize

    4KB

  • memory/4624-160-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-158-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-220-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-222-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-223-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-224-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-225-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-166-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-228-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-256-0x0000000000550000-0x0000000001550000-memory.dmp

    Filesize

    16.0MB

  • memory/4624-157-0x0000000014E40000-0x0000000014E41000-memory.dmp

    Filesize

    4KB

  • memory/4936-234-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4936-235-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4936-236-0x0000000005020000-0x00000000050A2000-memory.dmp

    Filesize

    520KB

  • memory/4936-237-0x00000000051E0000-0x0000000005202000-memory.dmp

    Filesize

    136KB

  • memory/4936-233-0x0000000005330000-0x0000000005958000-memory.dmp

    Filesize

    6.2MB

  • memory/4936-238-0x0000000005AD0000-0x0000000005B36000-memory.dmp

    Filesize

    408KB

  • memory/4936-244-0x0000000005BB0000-0x0000000005C16000-memory.dmp

    Filesize

    408KB

  • memory/4936-249-0x0000000005A90000-0x0000000005AA0000-memory.dmp

    Filesize

    64KB

  • memory/4936-250-0x0000000006190000-0x0000000006292000-memory.dmp

    Filesize

    1.0MB

  • memory/4936-251-0x00000000062B0000-0x00000000062CE000-memory.dmp

    Filesize

    120KB

  • memory/4936-232-0x0000000004B40000-0x0000000004B76000-memory.dmp

    Filesize

    216KB