Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 18:43

General

  • Target

    b0196a1c78b8c7bef7dfdfe9995e8431d9ec5c78893ba30586a508fe25acfd9f.exe

  • Size

    2.7MB

  • MD5

    1ecf652d87abf446360420d46184dfa5

  • SHA1

    d043b2e578ca2c5cf4bbe8fb80a1f11e40cb24cd

  • SHA256

    b0196a1c78b8c7bef7dfdfe9995e8431d9ec5c78893ba30586a508fe25acfd9f

  • SHA512

    5f1e0e932604998764306b8bde95f68a5786750211a6890038fe8af16c4497ac6b147763dcfff141d850b9de49e24c838650d0767bf2f61070e16573cacb9cae

  • SSDEEP

    49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlGglCdDtUld:Q+8X9G3vP3AM0glqZC

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 6 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0196a1c78b8c7bef7dfdfe9995e8431d9ec5c78893ba30586a508fe25acfd9f.exe
    "C:\Users\Admin\AppData\Local\Temp\b0196a1c78b8c7bef7dfdfe9995e8431d9ec5c78893ba30586a508fe25acfd9f.exe"
    1⤵
      PID:4616
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3532
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1784
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3488
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2724
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4708
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SendNotifyMessage
      PID:4976
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4960
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
        PID:2132
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:3320
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:4148
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:1088
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:2120
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:4368
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:4056
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                      PID:4156
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:1920
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:8
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:3952
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:3800
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:4160
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:2156
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:4248
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:2772
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:4768
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:4108

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                          Filesize

                                          471B

                                          MD5

                                          976ce2c91cbe61b98378e8e5c5ba4d53

                                          SHA1

                                          45b3e1eabb4e759bf46ffeb8f9722077a0d62c72

                                          SHA256

                                          255f312d16d7d080cf1a97d4eb255c236c7eee6c059d732d970e3c05c07c158e

                                          SHA512

                                          0065b7984960354aea85cd0c6792e019f40a2b359fabf7dcee438193c1bab47d74d59602627c8399df741864dffb0469d9cf8bc48907c1c67015c51d01a7b28a

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                          Filesize

                                          412B

                                          MD5

                                          1eea8b27832c35c4ab53e67a052988c5

                                          SHA1

                                          1e501fcd92eb9d156ec7da4ce25fc2cda4266141

                                          SHA256

                                          9f09cfdc2772953412d841ca1f72e761788698c3461bdfd9317d8cfa042dd1a7

                                          SHA512

                                          6aa94724d220fa45497ec42eb13299d3ba5f7f3cdb7b72c04821da1a12915689093ff04eb0dc74459c9387b6be2624743c56899391c013c872d0608670beb52d

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZVGOYGA8\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          c31f790cfd02ef244af845fc39b43ad4

                                          SHA1

                                          947a1baf207f5bc852b97ed0eca9a029c58b5126

                                          SHA256

                                          5cf8b4a512238a819ac8e892709eb239e784c6fb6c70fdb8c05bc258962fe489

                                          SHA512

                                          135037a2d115efdab8b9fd4211289603115ee8ddfd6cda42b831a12984128e24dcb13ff7669b97077787743ef437a64e0bcb84bad7abe569af4403b4052b09f5

                                        • memory/8-67-0x000002A9606C0000-0x000002A9606E0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/8-65-0x000002A960070000-0x000002A960090000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/8-63-0x000002A9600B0000-0x000002A9600D0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/2132-30-0x0000000004730000-0x0000000004731000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2156-101-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2772-113-0x000001C132A40000-0x000001C132A60000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/2772-111-0x000001C1323A0000-0x000001C1323C0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/2772-109-0x000001C1323E0000-0x000001C132400000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/3488-7-0x0000000004540000-0x0000000004541000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3952-78-0x0000000004D90000-0x0000000004D91000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4148-41-0x0000028BD0340000-0x0000028BD0360000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4148-38-0x0000028BD0380000-0x0000028BD03A0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4148-43-0x0000028BD07B0000-0x0000028BD07D0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4156-55-0x0000000004760000-0x0000000004761000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4160-86-0x000001BCC0020000-0x000001BCC0040000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4160-91-0x000001BCC0480000-0x000001BCC04A0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4160-88-0x000001BCBFDE0000-0x000001BCBFE00000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4708-14-0x00000200B5A60000-0x00000200B5A80000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4708-17-0x00000200B5A20000-0x00000200B5A40000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4708-21-0x00000200B60C0000-0x00000200B60E0000-memory.dmp

                                          Filesize

                                          128KB