Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
88550b713dda18_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
88550b713dda18_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
88550b713dda18_JC.exe
-
Size
280KB
-
MD5
88550b713dda181f1cc2c3179a069987
-
SHA1
b674758b118cc935343d45a1df3be2b371c54879
-
SHA256
de22f3a6f9e223c9f31fd13031f6adaf35cbb7908e34f30fdb6dd67a545169ff
-
SHA512
cba7382cff07cb23ea6d3246f8a81a435f2730bb97d3dd7bb4f13fb562ccc26189be133497ee6fe82dc44ebae653c58a2cfaf999e5d9e369e5676b6856133e9a
-
SSDEEP
6144:QTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:QTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation 88550b713dda18_JC.exe -
Executes dropped EXE 2 IoCs
pid Process 4640 lsassys.exe 4996 lsassys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\DefaultIcon 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\DefaultIcon\ = "%1" 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\lsassys.exe\" /START \"%1\" %*" 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_32\\lsassys.exe\" /START \"%1\" %*" 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\ = "Application" 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\DefaultIcon\ = "%1" 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas 88550b713dda18_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\Content-Type = "application/x-msdownload" 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\ = "halnt" 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\shell\runas\command 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\shell\open\command 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\shell 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\shell\open 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\shell\runas\command\ = "\"%1\" %*" 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\halnt\shell\runas 88550b713dda18_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\Content-Type = "application/x-msdownload" 88550b713dda18_JC.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\DefaultIcon 88550b713dda18_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4640 lsassys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3912 wrote to memory of 4640 3912 88550b713dda18_JC.exe 86 PID 3912 wrote to memory of 4640 3912 88550b713dda18_JC.exe 86 PID 3912 wrote to memory of 4640 3912 88550b713dda18_JC.exe 86 PID 4640 wrote to memory of 4996 4640 lsassys.exe 87 PID 4640 wrote to memory of 4996 4640 lsassys.exe 87 PID 4640 wrote to memory of 4996 4640 lsassys.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\88550b713dda18_JC.exe"C:\Users\Admin\AppData\Local\Temp\88550b713dda18_JC.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_32\lsassys.exe"3⤵
- Executes dropped EXE
PID:4996
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD54fd8e907045b66fac8acbe6781daa609
SHA13a4d41318021cfb342eed5492165967df537f1a6
SHA256691614061b570f855eb14481d31f9c91018a1df9703af410e04e06b7eaa4944a
SHA512ff76935f71bd3c72a03d59e757bf59d43e5fbd5c12ff3cae090ff803b13e0f44ef7eea2ebb874affffe521bf18f3aa2e82d927d5c76b0349a081dd0d1fa4251f
-
Filesize
280KB
MD54fd8e907045b66fac8acbe6781daa609
SHA13a4d41318021cfb342eed5492165967df537f1a6
SHA256691614061b570f855eb14481d31f9c91018a1df9703af410e04e06b7eaa4944a
SHA512ff76935f71bd3c72a03d59e757bf59d43e5fbd5c12ff3cae090ff803b13e0f44ef7eea2ebb874affffe521bf18f3aa2e82d927d5c76b0349a081dd0d1fa4251f
-
Filesize
280KB
MD54fd8e907045b66fac8acbe6781daa609
SHA13a4d41318021cfb342eed5492165967df537f1a6
SHA256691614061b570f855eb14481d31f9c91018a1df9703af410e04e06b7eaa4944a
SHA512ff76935f71bd3c72a03d59e757bf59d43e5fbd5c12ff3cae090ff803b13e0f44ef7eea2ebb874affffe521bf18f3aa2e82d927d5c76b0349a081dd0d1fa4251f
-
Filesize
280KB
MD54fd8e907045b66fac8acbe6781daa609
SHA13a4d41318021cfb342eed5492165967df537f1a6
SHA256691614061b570f855eb14481d31f9c91018a1df9703af410e04e06b7eaa4944a
SHA512ff76935f71bd3c72a03d59e757bf59d43e5fbd5c12ff3cae090ff803b13e0f44ef7eea2ebb874affffe521bf18f3aa2e82d927d5c76b0349a081dd0d1fa4251f