Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    172s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2023, 18:53

General

  • Target

    0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe

  • Size

    26.5MB

  • MD5

    970f1757ccc0b60859d23302688359ee

  • SHA1

    bbe7be423ba59b0e9872d4f8556b8a9f89d46204

  • SHA256

    0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73

  • SHA512

    ca1e1b4a018c730391b90b7b235932bc87b1aa331c1c8327d1aa510cb0c6eb49e7ed110703ae8b2c41e54c1f066d51fa691aff3e09c5cc7a22c3195bce23ff47

  • SSDEEP

    6144:O3Te8ySm8hQAAIfFrRXuEE+0l97mKwKArOHV3j86JQPDHDdx/Qtqa:B/zkFF+EExZmKbciVTPJQPDHvd

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 28 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe
    "C:\Users\Admin\AppData\Local\Temp\0de805cfde7a628a940caf8def63836afd6d75860614592f619797ff2265eb73.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:744
    • C:\Users\Admin\AppData\Local\Temp\zbhveeo.exe
      "C:\Users\Admin\AppData\Local\Temp\zbhveeo.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2232
    • C:\Users\Admin\AppData\Local\Temp\zbhveeo.exe
      "C:\Users\Admin\AppData\Local\Temp\zbhveeo.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • System policy modification
      PID:4288
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\srufliprxcryhtvagihkvbyfhn.hox

      Filesize

      272B

      MD5

      b7a223628039591df400d9d073074247

      SHA1

      14180f95d7dcb03027f9e1f210b3d25de0988b15

      SHA256

      bf73dd0ee59cf6e4fdf7f5d07180937f9a01e8cb9cfbc5c3b4b13f62041559ff

      SHA512

      ea510d20a9ff2fb79ec0be3806385663b3ec4ba5b3c19cdeb5bf84e4207791dd1237e2cb54d34d059810075fe8fb36ab979e5266d27156ef603934db86de713d

    • C:\Program Files (x86)\srufliprxcryhtvagihkvbyfhn.hox

      Filesize

      272B

      MD5

      0f9056c50e2315b04557c36ab01c3495

      SHA1

      8de638860abe1a44107f43f1e18cf0647e9fcc83

      SHA256

      c3cb50cd40a7e1bddadbd364efc4e39aed377a58048f00e6db9fd01d79e1de3a

      SHA512

      6bb036a8c74a071d73191d61ac99908e86605be8e8368a30183615c6ac72ee8854894686bbc725b73f4cd1bc1e28916e1da3549f1c7fcee29d0a8d195589239d

    • C:\Program Files (x86)\srufliprxcryhtvagihkvbyfhn.hox

      Filesize

      272B

      MD5

      6037e4cfda89ba67c51a0bd2a18b27a5

      SHA1

      787c6748b1d953883397bc08159031c8be71be4b

      SHA256

      97335a57aafddb3a48d1c681c2b7b7f948aba809adbc28c081b39570c5e292df

      SHA512

      119c2a163991006fecac1f12a1146ad686781a2c498b5beee03e36f72cbd95fff17f8a37f6ca400f9a06a1c3deed2369f6e64bcdbc24fa0960921a8516e8ea2b

    • C:\Program Files (x86)\srufliprxcryhtvagihkvbyfhn.hox

      Filesize

      272B

      MD5

      d8994d09373ea83c00a5baf7207df7ce

      SHA1

      2e7641254fdefda154d60c28b8634e96c524def5

      SHA256

      f6253f89aaa23c798b8706331d0e974451f6037ff13b66dc7f0810a3c81cd67e

      SHA512

      b4e49c8d1bb3b9ecb82a01eaec0dc170ea2e49562b29bd4c3ea4648936d835773316db8b6065be860b3802643bb1a49dfaed282fa38a495681dc60a535abb7f5

    • C:\Program Files (x86)\srufliprxcryhtvagihkvbyfhn.hox

      Filesize

      272B

      MD5

      a07bc0247012e2687d1ccffb9eb589b8

      SHA1

      0b9ca3f79333b4a1a96a24b6c877c8a9caeda2ed

      SHA256

      6b247f9241347be56ff8ff0c7274a15be4553165a9eba4be694b19372213ab45

      SHA512

      c9250a0862b40a573e94a36264235d00a9763af532f49e55b89da88b40ad7b56b4f1c7bc64f74731d0794abf4f9e7451b1f27dc76ca66e9373060a038ac747b6

    • C:\Users\Admin\AppData\Local\Temp\zbhveeo.exe

      Filesize

      30.5MB

      MD5

      62e318bdd360e8124fa8f1434a2f587c

      SHA1

      45dd33b2a04deff02245c75f2dd93375ba683640

      SHA256

      7a67d3bd8a729be3230d4800dbbd84480e508ca17f9c51c15241e77ead2d858e

      SHA512

      9af3475d2baf0981cde3bca4cc92d5ef7115baca26f243be242274b67fb8e3ff5228d72c92b797e1a2361b0ac35abb6c66b7485a4c722387aaf390193f40d2d5

    • C:\Users\Admin\AppData\Local\Temp\zbhveeo.exe

      Filesize

      30.5MB

      MD5

      62e318bdd360e8124fa8f1434a2f587c

      SHA1

      45dd33b2a04deff02245c75f2dd93375ba683640

      SHA256

      7a67d3bd8a729be3230d4800dbbd84480e508ca17f9c51c15241e77ead2d858e

      SHA512

      9af3475d2baf0981cde3bca4cc92d5ef7115baca26f243be242274b67fb8e3ff5228d72c92b797e1a2361b0ac35abb6c66b7485a4c722387aaf390193f40d2d5

    • C:\Users\Admin\AppData\Local\Temp\zbhveeo.exe

      Filesize

      30.5MB

      MD5

      62e318bdd360e8124fa8f1434a2f587c

      SHA1

      45dd33b2a04deff02245c75f2dd93375ba683640

      SHA256

      7a67d3bd8a729be3230d4800dbbd84480e508ca17f9c51c15241e77ead2d858e

      SHA512

      9af3475d2baf0981cde3bca4cc92d5ef7115baca26f243be242274b67fb8e3ff5228d72c92b797e1a2361b0ac35abb6c66b7485a4c722387aaf390193f40d2d5

    • C:\Users\Admin\AppData\Local\Temp\zbhveeo.exe

      Filesize

      30.5MB

      MD5

      62e318bdd360e8124fa8f1434a2f587c

      SHA1

      45dd33b2a04deff02245c75f2dd93375ba683640

      SHA256

      7a67d3bd8a729be3230d4800dbbd84480e508ca17f9c51c15241e77ead2d858e

      SHA512

      9af3475d2baf0981cde3bca4cc92d5ef7115baca26f243be242274b67fb8e3ff5228d72c92b797e1a2361b0ac35abb6c66b7485a4c722387aaf390193f40d2d5

    • C:\Users\Admin\AppData\Local\Temp\zbhveeo.exe

      Filesize

      30.5MB

      MD5

      62e318bdd360e8124fa8f1434a2f587c

      SHA1

      45dd33b2a04deff02245c75f2dd93375ba683640

      SHA256

      7a67d3bd8a729be3230d4800dbbd84480e508ca17f9c51c15241e77ead2d858e

      SHA512

      9af3475d2baf0981cde3bca4cc92d5ef7115baca26f243be242274b67fb8e3ff5228d72c92b797e1a2361b0ac35abb6c66b7485a4c722387aaf390193f40d2d5

    • C:\Users\Admin\AppData\Local\srufliprxcryhtvagihkvbyfhn.hox

      Filesize

      272B

      MD5

      83468ae00280b2dd428d29bff9dc1d0d

      SHA1

      d8c7176b0f423b3fece7ec3fdf5d112ab4f0b13b

      SHA256

      bfae2eefafacb4305508cef3110a8bbf105f6417554b184f3434d9deb74f4fc5

      SHA512

      373ec792774694103e344a1b46b51c598822fa7acd0a842714edfedbab3d8fdac69f38f3a6c8547ef2b0791b3d65e3cead425b56bb7e0a09e64c34c0c92a6833

    • C:\Users\Admin\AppData\Local\tdrnemeriyyqkhukboymizhzmdttlfcpfwjth.ucu

      Filesize

      3KB

      MD5

      fd25ee0deeb3caf44a87c5cd4849a24f

      SHA1

      25eb78e0acc1d5a30ec9036987c3f86b124186b2

      SHA256

      c83f404aa990490869e427d37ea5b16c2d3327e8421199105f51cfd564c1ddac

      SHA512

      10e0249cc40774fd7263f52cadcf111859a78f263cd0b55cad8077a5695398a72464326ea86f9e8482635c08c6d7ea075ad85a2de50da68ab34b1c5c358c9a89