Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    182s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 00:53

General

  • Target

    e1eda487a0ff7175e5eb282ba18e483259b76797f2cac297049333a925bc2a2d.exe

  • Size

    3.4MB

  • MD5

    b4a33246c1ec6a78a2a5f088afa14786

  • SHA1

    1501f9555b0d84d32d58c2c9bb2ac969abac8cd1

  • SHA256

    e1eda487a0ff7175e5eb282ba18e483259b76797f2cac297049333a925bc2a2d

  • SHA512

    a41fd4e7d743465ad75d0e2fba874b922530a387ff24ac5424ec57d7238f34a2fe06a596165a5c69d7b73b51e690c0dfbe8c2069462e0ddc52a70bce30128295

  • SSDEEP

    49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlIFLHrBZ8UTUm8VPnaDTVU/ML:Q+8X9G3vP3AMWFDvUm8VPna

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 10 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1eda487a0ff7175e5eb282ba18e483259b76797f2cac297049333a925bc2a2d.exe
    "C:\Users\Admin\AppData\Local\Temp\e1eda487a0ff7175e5eb282ba18e483259b76797f2cac297049333a925bc2a2d.exe"
    1⤵
      PID:5032
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3352
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:404
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1792
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3324
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4316
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2228
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4156
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1936
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3708
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:4912
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1724
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      PID:216
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:3580

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

        Filesize

        471B

        MD5

        976ce2c91cbe61b98378e8e5c5ba4d53

        SHA1

        45b3e1eabb4e759bf46ffeb8f9722077a0d62c72

        SHA256

        255f312d16d7d080cf1a97d4eb255c236c7eee6c059d732d970e3c05c07c158e

        SHA512

        0065b7984960354aea85cd0c6792e019f40a2b359fabf7dcee438193c1bab47d74d59602627c8399df741864dffb0469d9cf8bc48907c1c67015c51d01a7b28a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

        Filesize

        412B

        MD5

        5cd6a3704e397f16d567e5926803076d

        SHA1

        2d9e4ed9b2ae4b4df808a9c64c22773c503a5b3a

        SHA256

        e553987329965c70f585d2fec21a94d3aa7d690bf1fb7d30200c0c4e63cb56ea

        SHA512

        8bb55c56f81684ed6a3224e96d9631abbfbb9ca36fadd6713ba6b79ff40b5a14c68b971750474ddf60cec6d6aee5b100726f6079b0ae1741351321bcca79b95d

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133416288336442105.txt

        Filesize

        75KB

        MD5

        62d81c2e1e8b21733f95af2a596e4b18

        SHA1

        91c005ecc5ae4171f450c43c02d1ba532b4474c6

        SHA256

        a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

        SHA512

        c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

      • memory/216-191-0x000000000A250000-0x000000000A260000-memory.dmp

        Filesize

        64KB

      • memory/216-189-0x000000000A250000-0x000000000A260000-memory.dmp

        Filesize

        64KB

      • memory/1792-176-0x00000224B93F0000-0x00000224B9410000-memory.dmp

        Filesize

        128KB

      • memory/1792-173-0x00000224B8FE0000-0x00000224B9000000-memory.dmp

        Filesize

        128KB

      • memory/1792-171-0x00000224B9020000-0x00000224B9040000-memory.dmp

        Filesize

        128KB

      • memory/1936-94-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-87-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-108-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-110-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-109-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-105-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-107-0x0000000002E20000-0x0000000002E30000-memory.dmp

        Filesize

        64KB

      • memory/1936-106-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-101-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-102-0x0000000008430000-0x0000000008440000-memory.dmp

        Filesize

        64KB

      • memory/1936-103-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-100-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-98-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-96-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-92-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-93-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-79-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-91-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-90-0x0000000008430000-0x0000000008440000-memory.dmp

        Filesize

        64KB

      • memory/1936-88-0x0000000008430000-0x0000000008440000-memory.dmp

        Filesize

        64KB

      • memory/1936-89-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-111-0x0000000008430000-0x0000000008440000-memory.dmp

        Filesize

        64KB

      • memory/1936-85-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-80-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-82-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-83-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-81-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-77-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/1936-78-0x0000000002E20000-0x0000000002E30000-memory.dmp

        Filesize

        64KB

      • memory/1936-76-0x0000000002E10000-0x0000000002E20000-memory.dmp

        Filesize

        64KB

      • memory/2228-73-0x0000000003210000-0x0000000003220000-memory.dmp

        Filesize

        64KB

      • memory/3324-52-0x0000000008650000-0x0000000008660000-memory.dmp

        Filesize

        64KB

      • memory/3324-51-0x0000000008600000-0x0000000008610000-memory.dmp

        Filesize

        64KB

      • memory/3324-54-0x0000000008600000-0x0000000008610000-memory.dmp

        Filesize

        64KB

      • memory/3324-55-0x0000000008600000-0x0000000008610000-memory.dmp

        Filesize

        64KB

      • memory/3324-57-0x0000000008600000-0x0000000008610000-memory.dmp

        Filesize

        64KB

      • memory/3324-61-0x0000000008600000-0x0000000008610000-memory.dmp

        Filesize

        64KB

      • memory/3324-59-0x0000000008600000-0x0000000008610000-memory.dmp

        Filesize

        64KB

      • memory/3324-62-0x0000000008600000-0x0000000008610000-memory.dmp

        Filesize

        64KB

      • memory/3324-53-0x0000000008600000-0x0000000008610000-memory.dmp

        Filesize

        64KB

      • memory/3324-50-0x0000000008600000-0x0000000008610000-memory.dmp

        Filesize

        64KB

      • memory/3324-63-0x0000000008650000-0x0000000008660000-memory.dmp

        Filesize

        64KB

      • memory/3352-35-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-24-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-39-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-38-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-36-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-4-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-33-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-34-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-31-0x000000000AEC0000-0x000000000AED0000-memory.dmp

        Filesize

        64KB

      • memory/3352-32-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-28-0x0000000008240000-0x0000000008250000-memory.dmp

        Filesize

        64KB

      • memory/3352-30-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-29-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-26-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-27-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-8-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-22-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-20-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-19-0x000000000AEC0000-0x000000000AED0000-memory.dmp

        Filesize

        64KB

      • memory/3352-18-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-16-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-17-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-14-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-15-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-13-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-10-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-11-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-5-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-6-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-37-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/3352-7-0x0000000008240000-0x0000000008250000-memory.dmp

        Filesize

        64KB

      • memory/3352-9-0x0000000009880000-0x0000000009890000-memory.dmp

        Filesize

        64KB

      • memory/4912-132-0x0000000008A30000-0x0000000008A40000-memory.dmp

        Filesize

        64KB

      • memory/4912-136-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-138-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-141-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-140-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-142-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-144-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-143-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-148-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-150-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-146-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-153-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-152-0x0000000008A30000-0x0000000008A40000-memory.dmp

        Filesize

        64KB

      • memory/4912-151-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-154-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-155-0x0000000008330000-0x0000000008340000-memory.dmp

        Filesize

        64KB

      • memory/4912-156-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-157-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-158-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-160-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-162-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-165-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

        Filesize

        4KB

      • memory/4912-134-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-130-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-133-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-131-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB

      • memory/4912-129-0x0000000003AC0000-0x0000000003AD0000-memory.dmp

        Filesize

        64KB