Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 03:35
Behavioral task
behavioral1
Sample
f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe
Resource
win10v2004-20231020-en
General
-
Target
f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe
-
Size
4.3MB
-
MD5
6f100fd99236d88d87408239b808695d
-
SHA1
8c8a22a6c5274285ef86308fcea772407b7dcb1c
-
SHA256
f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3
-
SHA512
7fc3b46eafec82359c0bf539cb8bf798f9f2f9dcc956d44cb37c5313e91b16aff3ef6964418d4485400a6ea24094d7651c8dff382312335f733b9b1440970008
-
SSDEEP
49152:OQ6nZ5QZuTtS0rQMYOQ+q8CEvQ6ngQ6nx9KFeMkFd////z9qw:B6ZWsM0r1QnJ6X6x0FefFd////z9qw
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\Ky3zWzVQ8.sys ROUTE.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\International\Geo\Nation f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe -
Executes dropped EXE 1 IoCs
pid Process 5100 ROUTE.EXE -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\ \Windows\System32\TrsavcF.sys ROUTE.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Help\ROUTE.EXE Explorer.EXE File opened for modification C:\Windows\Help\ROUTE.EXE Explorer.EXE File created C:\Windows\hMVJjFoY.sys ROUTE.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 ROUTE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ROUTE.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName ROUTE.EXE -
Delays execution with timeout.exe 1 IoCs
pid Process 4180 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Software\Microsoft\Internet Explorer\New Windows\Allow ROUTE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\www.hao774.com ROUTE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3240 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeTcbPrivilege 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeDebugPrivilege 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeDebugPrivilege 3240 Explorer.EXE Token: SeDebugPrivilege 3240 Explorer.EXE Token: SeDebugPrivilege 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeDebugPrivilege 5100 ROUTE.EXE Token: SeDebugPrivilege 5100 ROUTE.EXE Token: SeDebugPrivilege 5100 ROUTE.EXE Token: SeIncBasePriorityPrivilege 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeDebugPrivilege 5100 ROUTE.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE 5100 ROUTE.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5100 ROUTE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 3240 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 50 PID 2352 wrote to memory of 3240 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 50 PID 2352 wrote to memory of 3240 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 50 PID 2352 wrote to memory of 3240 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 50 PID 2352 wrote to memory of 3240 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 50 PID 3240 wrote to memory of 5100 3240 Explorer.EXE 87 PID 3240 wrote to memory of 5100 3240 Explorer.EXE 87 PID 3240 wrote to memory of 5100 3240 Explorer.EXE 87 PID 3240 wrote to memory of 5100 3240 Explorer.EXE 87 PID 3240 wrote to memory of 5100 3240 Explorer.EXE 87 PID 3240 wrote to memory of 5100 3240 Explorer.EXE 87 PID 3240 wrote to memory of 5100 3240 Explorer.EXE 87 PID 2352 wrote to memory of 612 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 79 PID 2352 wrote to memory of 612 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 79 PID 2352 wrote to memory of 612 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 79 PID 2352 wrote to memory of 612 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 79 PID 2352 wrote to memory of 612 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 79 PID 2352 wrote to memory of 3236 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 90 PID 2352 wrote to memory of 3236 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 90 PID 2352 wrote to memory of 3236 2352 f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe 90 PID 3236 wrote to memory of 4180 3236 cmd.exe 92 PID 3236 wrote to memory of 4180 3236 cmd.exe 92 PID 3236 wrote to memory of 4180 3236 cmd.exe 92 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50 PID 5100 wrote to memory of 3240 5100 ROUTE.EXE 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe"C:\Users\Admin\AppData\Local\Temp\f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:4180
-
-
-
-
C:\Windows\Help\ROUTE.EXE"C:\Windows\Help\ROUTE.EXE"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD53c97e63423e527ba8381e81cba00b8cd
SHA1dc9ecd7e9ff4a4675c977a418bf1bb562c34c890
SHA256b8a28aeb6345ca88b04ff3d9fadf30eacf26958c991bd8e4fb1df12a68f60eae
SHA512e202d2202632a40423c339be2eabd6430b3ea07a744fef536c555a3c083a678e8e2e03b8ca95e19198ce744c33fbdfbc4db050c6738c5837a8675bcdf203cfdd