Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230915-en
General
-
Target
setup.exe
-
Size
7.2MB
-
MD5
c582d0c4448b428dddb04a6a21f440ff
-
SHA1
8ba225fe248601a8192c0e0a51bb78c15f825656
-
SHA256
f6933b70a82f621c116566015c6e2ee758f276b40cdd45f09ac32ec4a23b0148
-
SHA512
0ae54b79ef4e54f5314078710fa2189935c0334b6cd8383ed68541174ab45f5488c5a4d3be94fbbe30a8fc3b6481ea0e56de5956f0ac9e874c2596c92ad47378
-
SSDEEP
196608:91OgbDOZgrtMg7Jl3gxorpnkmJkIJJlu+W2B2wISe:3OgHbrljQx2pkmW6J/za
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation Install.exe -
Executes dropped EXE 2 IoCs
pid Process 4012 Install.exe 492 Install.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2076 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3128 wrote to memory of 4012 3128 setup.exe 85 PID 3128 wrote to memory of 4012 3128 setup.exe 85 PID 3128 wrote to memory of 4012 3128 setup.exe 85 PID 4012 wrote to memory of 492 4012 Install.exe 87 PID 4012 wrote to memory of 492 4012 Install.exe 87 PID 4012 wrote to memory of 492 4012 Install.exe 87 PID 492 wrote to memory of 4916 492 Install.exe 94 PID 492 wrote to memory of 4916 492 Install.exe 94 PID 492 wrote to memory of 4916 492 Install.exe 94 PID 492 wrote to memory of 3900 492 Install.exe 96 PID 492 wrote to memory of 3900 492 Install.exe 96 PID 492 wrote to memory of 3900 492 Install.exe 96 PID 4916 wrote to memory of 3036 4916 forfiles.exe 98 PID 4916 wrote to memory of 3036 4916 forfiles.exe 98 PID 4916 wrote to memory of 3036 4916 forfiles.exe 98 PID 3036 wrote to memory of 4540 3036 cmd.exe 99 PID 3036 wrote to memory of 4540 3036 cmd.exe 99 PID 3036 wrote to memory of 4540 3036 cmd.exe 99 PID 3900 wrote to memory of 1516 3900 forfiles.exe 100 PID 3900 wrote to memory of 1516 3900 forfiles.exe 100 PID 3900 wrote to memory of 1516 3900 forfiles.exe 100 PID 3036 wrote to memory of 2912 3036 cmd.exe 101 PID 3036 wrote to memory of 2912 3036 cmd.exe 101 PID 3036 wrote to memory of 2912 3036 cmd.exe 101 PID 1516 wrote to memory of 3528 1516 cmd.exe 102 PID 1516 wrote to memory of 3528 1516 cmd.exe 102 PID 1516 wrote to memory of 3528 1516 cmd.exe 102 PID 1516 wrote to memory of 2196 1516 cmd.exe 103 PID 1516 wrote to memory of 2196 1516 cmd.exe 103 PID 1516 wrote to memory of 2196 1516 cmd.exe 103 PID 492 wrote to memory of 2076 492 Install.exe 104 PID 492 wrote to memory of 2076 492 Install.exe 104 PID 492 wrote to memory of 2076 492 Install.exe 104 PID 492 wrote to memory of 964 492 Install.exe 107 PID 492 wrote to memory of 964 492 Install.exe 107 PID 492 wrote to memory of 964 492 Install.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\7zS9E43.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\7zSA0A5.tmp\Install.exe.\Install.exe /jyafdidIl "385118" /S3⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:4540
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:2912
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:3528
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:2196
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gnHELzAgQ" /SC once /ST 01:40:30 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:2076
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gnHELzAgQ"4⤵PID:964
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:3756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD5e7d34bf1997ab7450fa65621eeb231b6
SHA13e8aef62c5d4dfa0ffa8c59b0a8eefb6582481eb
SHA25686fdf002f79d8ffdc4d63790da26827e809d4ac05eec81659f189615a4dbf79f
SHA5126d2e5cdf4d795f4e13cfc029fb263e54a93f82356144de41181c895b840dace2d8ae012ebe281d17c74539392e0825cba2e46dbb9cc98b4801232afd30d3c635
-
Filesize
6.1MB
MD5e7d34bf1997ab7450fa65621eeb231b6
SHA13e8aef62c5d4dfa0ffa8c59b0a8eefb6582481eb
SHA25686fdf002f79d8ffdc4d63790da26827e809d4ac05eec81659f189615a4dbf79f
SHA5126d2e5cdf4d795f4e13cfc029fb263e54a93f82356144de41181c895b840dace2d8ae012ebe281d17c74539392e0825cba2e46dbb9cc98b4801232afd30d3c635
-
Filesize
6.8MB
MD55db0193da7e649b4780931ec50e42756
SHA1a1ffbc1c4732e4bb6b17c381ead46823af967e75
SHA2567b0d42f7aa62939194632c7077daca05f2399de0b462e72b2b75b52b779e6d83
SHA512f4fbd0d8cb15d7ccd2b831d0e8574a223c45c142787e94779a20751edf28007ef0f3aeb67b246cd442dbf769a0f4871edd4f900be52d6c9b1c72df1ce8df7235