Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2023, 10:49
Behavioral task
behavioral1
Sample
d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe
Resource
win10v2004-20230915-en
General
-
Target
d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe
-
Size
3.0MB
-
MD5
36b8caffad1fd3c6ce6e3f3037f3ce89
-
SHA1
c4799b5bdc1adb5ccc66cecc3eda2e0d39c02e34
-
SHA256
d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d
-
SHA512
341380a31d0aa845d2420bba64f385fa50a67bd31ceb79b03115ab3b45cfab2e1347375140b1016c0de304618999f1c319871500c407be37f54ce85595969a68
-
SSDEEP
49152:MTGkQm5QZuTtS0rQMYOQ+q8CEwTG4QiTGHQI9KFeM7:MKkZWsM0r1QnXK4HKHP0Fee
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\IU8ermHm.sys mtstocom.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe -
Executes dropped EXE 2 IoCs
pid Process 732 1841e4d4 4804 mtstocom.exe -
resource yara_rule behavioral2/memory/544-0-0x0000000000510000-0x0000000000599000-memory.dmp upx behavioral2/files/0x00080000000231e6-2.dat upx behavioral2/memory/732-3-0x0000000000D30000-0x0000000000DB9000-memory.dmp upx behavioral2/files/0x00080000000231e6-4.dat upx behavioral2/memory/544-30-0x0000000000510000-0x0000000000599000-memory.dmp upx behavioral2/memory/544-37-0x0000000000510000-0x0000000000599000-memory.dmp upx behavioral2/memory/732-38-0x0000000000D30000-0x0000000000DB9000-memory.dmp upx behavioral2/memory/732-67-0x0000000000D30000-0x0000000000DB9000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DED9969D7ED2C6E555C5C9254A43EDE4 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A 1841e4d4 File created C:\Windows\SysWOW64\1841e4d4 d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe File created C:\Windows\system32\ \Windows\System32\b2nFnT.sys mtstocom.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content 1841e4d4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DED9969D7ED2C6E555C5C9254A43EDE4 1841e4d4 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\c8838 1841e4d4 File created C:\Windows\H6EDQTo.sys mtstocom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 mtstocom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 mtstocom.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName mtstocom.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2208 timeout.exe 2200 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Software\Microsoft\Internet Explorer\New Windows\Allow mtstocom.exe Set value (data) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\www.hao774.com mtstocom.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 1841e4d4 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 1841e4d4 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 1841e4d4 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 1841e4d4 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 1841e4d4 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 1841e4d4 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 1841e4d4 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 1841e4d4 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 1841e4d4 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 732 1841e4d4 732 1841e4d4 732 1841e4d4 732 1841e4d4 732 1841e4d4 732 1841e4d4 732 1841e4d4 732 1841e4d4 732 1841e4d4 732 1841e4d4 3160 Explorer.EXE 3160 Explorer.EXE 3160 Explorer.EXE 3160 Explorer.EXE 732 1841e4d4 732 1841e4d4 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3160 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 544 d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe Token: SeTcbPrivilege 544 d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe Token: SeDebugPrivilege 732 1841e4d4 Token: SeTcbPrivilege 732 1841e4d4 Token: SeDebugPrivilege 732 1841e4d4 Token: SeDebugPrivilege 3160 Explorer.EXE Token: SeDebugPrivilege 3160 Explorer.EXE Token: SeIncBasePriorityPrivilege 544 d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe Token: SeDebugPrivilege 732 1841e4d4 Token: SeDebugPrivilege 4804 mtstocom.exe Token: SeDebugPrivilege 4804 mtstocom.exe Token: SeDebugPrivilege 4804 mtstocom.exe Token: SeShutdownPrivilege 3160 Explorer.EXE Token: SeCreatePagefilePrivilege 3160 Explorer.EXE Token: SeIncBasePriorityPrivilege 732 1841e4d4 Token: SeDebugPrivilege 4804 mtstocom.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe 4804 mtstocom.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4804 mtstocom.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3160 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 732 wrote to memory of 3160 732 1841e4d4 49 PID 732 wrote to memory of 3160 732 1841e4d4 49 PID 732 wrote to memory of 3160 732 1841e4d4 49 PID 732 wrote to memory of 3160 732 1841e4d4 49 PID 732 wrote to memory of 3160 732 1841e4d4 49 PID 3160 wrote to memory of 4804 3160 Explorer.EXE 91 PID 3160 wrote to memory of 4804 3160 Explorer.EXE 91 PID 3160 wrote to memory of 4804 3160 Explorer.EXE 91 PID 3160 wrote to memory of 4804 3160 Explorer.EXE 91 PID 3160 wrote to memory of 4804 3160 Explorer.EXE 91 PID 3160 wrote to memory of 4804 3160 Explorer.EXE 91 PID 3160 wrote to memory of 4804 3160 Explorer.EXE 91 PID 732 wrote to memory of 588 732 1841e4d4 3 PID 732 wrote to memory of 588 732 1841e4d4 3 PID 732 wrote to memory of 588 732 1841e4d4 3 PID 732 wrote to memory of 588 732 1841e4d4 3 PID 732 wrote to memory of 588 732 1841e4d4 3 PID 544 wrote to memory of 5048 544 d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe 96 PID 544 wrote to memory of 5048 544 d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe 96 PID 544 wrote to memory of 5048 544 d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe 96 PID 5048 wrote to memory of 2208 5048 cmd.exe 99 PID 5048 wrote to memory of 2208 5048 cmd.exe 99 PID 5048 wrote to memory of 2208 5048 cmd.exe 99 PID 732 wrote to memory of 2060 732 1841e4d4 102 PID 732 wrote to memory of 2060 732 1841e4d4 102 PID 732 wrote to memory of 2060 732 1841e4d4 102 PID 2060 wrote to memory of 2200 2060 cmd.exe 104 PID 2060 wrote to memory of 2200 2060 cmd.exe 104 PID 2060 wrote to memory of 2200 2060 cmd.exe 104 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49 PID 4804 wrote to memory of 3160 4804 mtstocom.exe 49
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:588
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe"C:\Users\Admin\AppData\Local\Temp\d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\d97b4646318bb9f0e451a5f9c7ec1c94ad1ec688e15f47ed95882b0498c7128d.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:2208
-
-
-
-
C:\ProgramData\mtstocom.exe"C:\ProgramData\mtstocom.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804
-
-
C:\Windows\Syswow64\1841e4d4C:\Windows\Syswow64\1841e4d41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\1841e4d4"2⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5963d599f73fe512dcae1887c9fedd346
SHA1b3a3c22ce3b3560403407cf3f59d64368b457296
SHA25666479fca0dc380ecbd62bc55a75c2ab5b33fbf3d2119c47748fbf3a3dd3a0954
SHA51247379a52e2844c3e76811234483fa5e1cc72005d18e8df28907a56f0a312c8b3d4919dce86e35d7ea734df64f29b4266ef2ccf25cf956d681cb6feee41b158e0
-
Filesize
3.0MB
MD5a9ef47ef250d8958fc3708b9b3eb3ef7
SHA16d6d91f85a1cdaaf39f9ae87bd4dbb16f431628d
SHA2560c8cd58fd5fe0b067a78767ab36e7007d7f33e064ddcc13ec3d6b5f9edf7aa8c
SHA5124b8baa840c3a1d84b6de3a5aba1524c404d9b3715e218694aa28c93200461f3d61cf23c95951ac3d9c9d3b47766276daeef6136c7e6ede9eb5cf0c790d2f491f
-
Filesize
3.0MB
MD5a9ef47ef250d8958fc3708b9b3eb3ef7
SHA16d6d91f85a1cdaaf39f9ae87bd4dbb16f431628d
SHA2560c8cd58fd5fe0b067a78767ab36e7007d7f33e064ddcc13ec3d6b5f9edf7aa8c
SHA5124b8baa840c3a1d84b6de3a5aba1524c404d9b3715e218694aa28c93200461f3d61cf23c95951ac3d9c9d3b47766276daeef6136c7e6ede9eb5cf0c790d2f491f