Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    85s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2023, 07:49

General

  • Target

    chuanameexe.exe

  • Size

    157KB

  • MD5

    5767ca40c29cb20842c8d3b12c93d582

  • SHA1

    8fe5bcd90416a48b3f862ea52f726239d2d8efc3

  • SHA256

    a14f448e7fbeed5aee2f0db602bca444bb821e731452e0e43f914b1cd902fec5

  • SHA512

    9c6fd9ffb1b0ea6305c4ed893923aa2e21ccaa63797b36458dc63eabd84e01cbc6b3331d808b58c79ae74122ee841872ab1e12683f8065ba0f40042f7f8b6321

  • SSDEEP

    3072:s2A2+ClsFxK7hfi5ji+8T26z02mNt4H96u:/AbZFx4h2uaew4Hn

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    38.54.95.217
  • Port:
    21
  • Username:
    123
  • Password:
    123

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\chuanameexe.exe
    "C:\Users\Admin\AppData\Local\Temp\chuanameexe.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\ProgramData\babyiloveyou\local.exe
      "C:\ProgramData\babyiloveyou\local.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4868
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3976
    • C:\Users\Admin\AppData\Local\Temp\{7CBBA74D-F726-45b3-88A7-95870B05D57E}.exe
      "C:\Users\Admin\AppData\Local\Temp\{7CBBA74D-F726-45b3-88A7-95870B05D57E}.exe" /s "C:\Users\Admin\AppData\Local\Temp\\{0D611EE8-33DA-40d6-9610-3D0F5FA5F9A0}"
      1⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:4396

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\babyiloveyou\local.exe

      Filesize

      141KB

      MD5

      fd296444464edd9d1ca67e62c1494fb8

      SHA1

      b81b8a3e55754c7597d51f144b878de6987770b6

      SHA256

      91209859d25234012d06df1fa27e4e1f842f5a897a565bab217774841d7b24a6

      SHA512

      50f892cea7629f4953231925a38ae9fd768df2167a7070b2add79f4dbaf8d7e563ec2343abdf133c7e14bea4f2f9d3ed41690c40ae364934c070bc58bafc574f

    • C:\ProgramData\babyiloveyou\local.exe

      Filesize

      141KB

      MD5

      fd296444464edd9d1ca67e62c1494fb8

      SHA1

      b81b8a3e55754c7597d51f144b878de6987770b6

      SHA256

      91209859d25234012d06df1fa27e4e1f842f5a897a565bab217774841d7b24a6

      SHA512

      50f892cea7629f4953231925a38ae9fd768df2167a7070b2add79f4dbaf8d7e563ec2343abdf133c7e14bea4f2f9d3ed41690c40ae364934c070bc58bafc574f

    • C:\ProgramData\babyiloveyou\local.exe

      Filesize

      141KB

      MD5

      fd296444464edd9d1ca67e62c1494fb8

      SHA1

      b81b8a3e55754c7597d51f144b878de6987770b6

      SHA256

      91209859d25234012d06df1fa27e4e1f842f5a897a565bab217774841d7b24a6

      SHA512

      50f892cea7629f4953231925a38ae9fd768df2167a7070b2add79f4dbaf8d7e563ec2343abdf133c7e14bea4f2f9d3ed41690c40ae364934c070bc58bafc574f

    • C:\Users\Admin\AppData\Local\Temp\RegWorkshop.ini

      Filesize

      829B

      MD5

      a3dd775111efd46e0abd9ef662e6d458

      SHA1

      07a2759e6d7237a279b5bcf8cb177b9fd6c673ba

      SHA256

      31ef3bed15d38e2c5333e311c562e11f068b19d0539ce28af9f3411ee7ef15be

      SHA512

      f953e0687fd5421b9cc42d49ebb6abff66a894422c7ac182b614d2066b58fdb79f0ac4c22fae78359f120ae3e537f47e081503ee6761e1660bf2bba1132d4c2c

    • C:\Users\Admin\AppData\Local\Temp\RegWorkshop.ini

      Filesize

      2KB

      MD5

      ff0c7c2667dff4f3ed588f40d047c642

      SHA1

      1162c83bd0bb0d81b7ab7f616cb012b790aa4adf

      SHA256

      02af5cb061fd8075e9475c45ab20e86cf2bb4ca9511ddad348645ed5183b9fc7

      SHA512

      539b1d443232758b6c60a287f2a40200e6e3ba7353f11f18e29ba265c9569a4610e4a80910f79660368a916576ab9c486efa248bf3257e522ef5bfb3d42ef3c3

    • C:\Users\Admin\AppData\Local\Temp\{0D611EE8-33DA-40d6-9610-3D0F5FA5F9A0}

      Filesize

      215B

      MD5

      b36872603898adf29dc000d66f9ee3ef

      SHA1

      b791670740194ec215630203969a622f35c398ec

      SHA256

      fcc78b7741d25bc7bafa41631bf23ab6fae4b008bc59beb341210c11a922c090

      SHA512

      647b0e7eb517bd92c0aa866fc09db13b7499f4d4c54110285e254d996c5ce7e9633dc9ed9ddc00173a041771ec5f39dc0e555b6c2cd454443ab66df2a8d2fd35

    • C:\Users\Admin\AppData\Local\Temp\{7CBBA74D-F726-45b3-88A7-95870B05D57E}.exe

      Filesize

      1.0MB

      MD5

      217dc98e219a340cb09915244c992a52

      SHA1

      a04f101ca7180955d62e4a1aaeccdcca489209da

      SHA256

      27c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c

      SHA512

      dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85

    • C:\Users\Admin\AppData\Local\Temp\{7CBBA74D-F726-45b3-88A7-95870B05D57E}.exe

      Filesize

      1.0MB

      MD5

      217dc98e219a340cb09915244c992a52

      SHA1

      a04f101ca7180955d62e4a1aaeccdcca489209da

      SHA256

      27c8bd76150ddda5b09d6db11f67269cee2eecac345df67f93aab3e3aaabde7c

      SHA512

      dddc15992533c8c13000163c7dd59b20e2fbdedbf611338c04f6f9209ec1a95d1f93aaeeae2778890214d333320978f5d2554348722ea6c8489320f0ef1c4c85

    • memory/468-135-0x00000000030C0000-0x00000000033AE000-memory.dmp

      Filesize

      2.9MB

    • memory/468-136-0x0000000010000000-0x00000000102F2000-memory.dmp

      Filesize

      2.9MB

    • memory/4868-162-0x0000000002CF0000-0x0000000002D31000-memory.dmp

      Filesize

      260KB

    • memory/4868-307-0x0000000010000000-0x0000000010048000-memory.dmp

      Filesize

      288KB

    • memory/4868-312-0x0000000010000000-0x0000000010048000-memory.dmp

      Filesize

      288KB

    • memory/4868-313-0x0000000010000000-0x0000000010048000-memory.dmp

      Filesize

      288KB

    • memory/4868-315-0x0000000010000000-0x0000000010048000-memory.dmp

      Filesize

      288KB

    • memory/4868-316-0x0000000010000000-0x0000000010048000-memory.dmp

      Filesize

      288KB