Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe
Resource
win7-20231023-en
General
-
Target
72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe
-
Size
304KB
-
MD5
b728c2840a02568443366cf9d31b4e79
-
SHA1
290262cf698471ac7a25c002cc5e32c45343354a
-
SHA256
72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948
-
SHA512
663f58c57f7fb01fec32c6a7f72742edf45c37f4e12caef7def07e504d1aefcf51d873fc28682161a0affbcf536f40e967049f84a6376f33cb1e1c77f0be9de5
-
SSDEEP
6144:vIMnCyxDUQyNjIY6UAik3W6EoXJAOueOef5SG4X9Wx+8tCNyY:1C2U3Nj56Jik3n5EeOK8Mx+8kNH
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" VjnZON7W.exe -
Downloads MZ/PE file
-
Modifies RDP port number used by Windows 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe -
Executes dropped EXE 1 IoCs
pid Process 4256 VjnZON7W.exe -
resource yara_rule behavioral2/files/0x0007000000022e39-15.dat upx behavioral2/files/0x0007000000022e39-21.dat upx behavioral2/memory/4256-23-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral2/files/0x0007000000022e39-22.dat upx behavioral2/memory/4256-63-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3928 3832 WerFault.exe 87 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VjnZON7W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz VjnZON7W.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3832 72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe 3832 72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe 3832 72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe 3832 72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4256 VjnZON7W.exe 4256 VjnZON7W.exe 4256 VjnZON7W.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3832 wrote to memory of 4256 3832 72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe 98 PID 3832 wrote to memory of 4256 3832 72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe 98 PID 3832 wrote to memory of 4256 3832 72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe 98 PID 4256 wrote to memory of 732 4256 VjnZON7W.exe 102 PID 4256 wrote to memory of 732 4256 VjnZON7W.exe 102 PID 4256 wrote to memory of 732 4256 VjnZON7W.exe 102 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" VjnZON7W.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe"C:\Users\Admin\AppData\Local\Temp\72c50bb47ae31af0b64594a40c195ea174822d84c455da5356726cbf3b031948.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Public\Music\REHCsH\VjnZON7W.exe"C:\Users\Public\Music\REHCsH\VjnZON7W.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4256 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\xxxx.ini3⤵PID:732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 12002⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3832 -ip 38321⤵PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e39405e85e09f64ccde0f59392317dd3
SHA19c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b
SHA256cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f
SHA5126733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a
-
Filesize
36KB
MD5f6bf82a293b69aa5b47d4e2de305d45a
SHA14948716616d4bbe68be2b4c5bf95350402d3f96f
SHA2566a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0
SHA512edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa
-
Filesize
358KB
MD53be1ec3b45929c27aa05da4f0d36c62d
SHA1595916515e3e7f04d82d5f271bdbec1346a64598
SHA256aa7f0ccc36d07d06bf46488f1c3c6f9da8f5f6fa5005616cd235e22ef2218044
SHA512c9c0e228d04fa066961290fcd7978c3be1319e81fd8b579e7a3138db63c267178b63b3f829299a174632bf1667ecace9b6f919281ccfcd1766a0609152ad9d18
-
Filesize
132KB
MD5d5c73cfbb684f59176fe24f62f477bdb
SHA1b4c7a63fdb4bcff732fd0f6fc0ccb12ac6ec5ca2
SHA2567cbcfcc9790c6e9c1626a598677462a91b979340615375faa1a2f25d4ef31df3
SHA5121d26d7a7dc9f0a355b85a4be3eed80c62ea28861f9eeb11819e5cd7a62ceb1f0784246e37ea2f178f9846dee75f5a9c8aabbc050b2234ecc0d743ecce3276173
-
Filesize
525KB
MD5c415a0405980406ae2142cad6b438a3a
SHA1e26e7dd5b9b2f341da7b18d79334800bd8113ac8
SHA256cc2539f1c385556963362a2e599bef943b028d45f73dcbcd67e546d57768987a
SHA512d6aa65e8192ed230fb810c3c9e4f4000a7344b97f3eb1a1f4a78086822d30d6a9450d9873cb3d0d3ef2b3a494c87acd51f053eef7cf3acab05498ffde41aa45f
-
Filesize
525KB
MD5c415a0405980406ae2142cad6b438a3a
SHA1e26e7dd5b9b2f341da7b18d79334800bd8113ac8
SHA256cc2539f1c385556963362a2e599bef943b028d45f73dcbcd67e546d57768987a
SHA512d6aa65e8192ed230fb810c3c9e4f4000a7344b97f3eb1a1f4a78086822d30d6a9450d9873cb3d0d3ef2b3a494c87acd51f053eef7cf3acab05498ffde41aa45f
-
Filesize
525KB
MD5c415a0405980406ae2142cad6b438a3a
SHA1e26e7dd5b9b2f341da7b18d79334800bd8113ac8
SHA256cc2539f1c385556963362a2e599bef943b028d45f73dcbcd67e546d57768987a
SHA512d6aa65e8192ed230fb810c3c9e4f4000a7344b97f3eb1a1f4a78086822d30d6a9450d9873cb3d0d3ef2b3a494c87acd51f053eef7cf3acab05498ffde41aa45f
-
Filesize
76KB
MD54988e45ca7c6f8ef73a28be140761dd7
SHA1f4b0b9ec8f20f913b76870dbe61e2242ef7f8634
SHA256e7fa2d1b41ccf1e2cc0de264e96ed52afd882a5322fe66d48eb65cb5085c0a75
SHA512dd0d2ec27c204c139a23fb07d6889ecbee3c022cc87cc47d9afb7161082cdccf260845978fd084b663d70f7470bc1e6981e05ca284db80908b912211889042b5