Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    88s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2023, 18:59

General

  • Target

    10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689.exe

  • Size

    2.0MB

  • MD5

    8e65ea65872f75ccfd39c9b3a976a4ea

  • SHA1

    da6db35943ca0c75cd7031495c40204fe3875ef9

  • SHA256

    10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689

  • SHA512

    b1c2e09595dbf8453310b5a547235965b86b2252db02ce1c6e0abe9017e844174c4596855ee3a414e9e49258651139624bb2e2900a92c3e839289b7580bc874b

  • SSDEEP

    6144:P3ve8ySm8hQAAIfFrRXuEE+0l97mKwKR6HVGI86JQPDHDdx/Qtqa:u/zkFF+EExZmKbReVzPJQPDHvd

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 25 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689.exe
    "C:\Users\Admin\AppData\Local\Temp\10c8eefdb8344886070087f4522f92d33ee5cea76f0261fac60a5cb66354e689.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3372
    • C:\Users\Admin\AppData\Local\Temp\vikuegq.exe
      "C:\Users\Admin\AppData\Local\Temp\vikuegq.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:5040
    • C:\Users\Admin\AppData\Local\Temp\vikuegq.exe
      "C:\Users\Admin\AppData\Local\Temp\vikuegq.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Modifies registry class
      • System policy modification
      PID:4480
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2148

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\yezcfaddwxxktnsnvdyezc.add

      Filesize

      272B

      MD5

      7fb95948ea0182ad6312640d817bb791

      SHA1

      ee9f4e84bff881d6a97c5a76ec7d83044d2c3c01

      SHA256

      c830981ef89e336f9bcf4e3655889814bd6d49c0adbf824fe6f27990b19d981d

      SHA512

      d181434b7896585642e03d70e4201e36c9cc780b57e920602c4eecbc214a7b38c058879b24b1dd76af4f284ea01701c961b1c9e256bdb1bb7f7187f93eab8957

    • C:\Program Files (x86)\yezcfaddwxxktnsnvdyezc.add

      Filesize

      272B

      MD5

      5ad07c01f7c80a8c0ae6fe07461f7374

      SHA1

      6064a5fcf30610849d942a171ff094cd3bb8dc63

      SHA256

      50b65617e2a0da1b499559b4b09da16312f3707194f516a477b99564bdb343d5

      SHA512

      d7a13c0de111051e2781436de68331fe27e96668d9d61919d95a4a9e9a4eeb6b039b03b4a8dc791698039d6fb08633f7a0f6a2947f54d9aa9162204d35db3f95

    • C:\Program Files (x86)\yezcfaddwxxktnsnvdyezc.add

      Filesize

      272B

      MD5

      86290ae37f903e071ac3d1a1bd206106

      SHA1

      e95cd92dce96ffcc33ad7196ce4d58de7883460f

      SHA256

      a3a8cc0aaf43c65e159d82964cb1d664aa5e3af5fed5c9220178bb72dfdc281c

      SHA512

      c71453401794bfbe235ff77b394668df2361f627a4dad911c848c2ca0ef786588f0efc5cbc0b9ff595892e83551f155bc0c08e7051364d6aae6f3497ed2dcbd6

    • C:\Program Files (x86)\yezcfaddwxxktnsnvdyezc.add

      Filesize

      272B

      MD5

      5ed4bd5312bf0c29656b96fd494e255f

      SHA1

      5bf812e12e63ee6a914c851ba502c400dba1db1d

      SHA256

      aa23114d3a646d339199e50e5de67298e8507564cc5b5e2752433f6842fb5c91

      SHA512

      2fc2417ed9f29b3f81eb89da32399e462e648c2d6e4216a1d2ffc5e255aa79715747449a475afb4b0bc28a8d4ee26d0a2d69d469a2f9b188e6f6eb5521a66dbe

    • C:\Users\Admin\AppData\Local\Temp\vikuegq.exe

      Filesize

      3.0MB

      MD5

      8082b0cbee1d15a4233f570e34775085

      SHA1

      5d58989e297a70288f7129ecadff521144f694b6

      SHA256

      db246599af1fbb48b3b1b541310a0632ca0a1d3cc4990007632b733a6b5418ae

      SHA512

      89f17a1acdf6d5f9384db2df56a246f97c4ecaee21a76132b044dc18a8260ef78f7ae48ab279df9cf55d0b72413ad24bb65117f4399b31df145bade4d2f20714

    • C:\Users\Admin\AppData\Local\Temp\vikuegq.exe

      Filesize

      3.0MB

      MD5

      8082b0cbee1d15a4233f570e34775085

      SHA1

      5d58989e297a70288f7129ecadff521144f694b6

      SHA256

      db246599af1fbb48b3b1b541310a0632ca0a1d3cc4990007632b733a6b5418ae

      SHA512

      89f17a1acdf6d5f9384db2df56a246f97c4ecaee21a76132b044dc18a8260ef78f7ae48ab279df9cf55d0b72413ad24bb65117f4399b31df145bade4d2f20714

    • C:\Users\Admin\AppData\Local\Temp\vikuegq.exe

      Filesize

      3.0MB

      MD5

      8082b0cbee1d15a4233f570e34775085

      SHA1

      5d58989e297a70288f7129ecadff521144f694b6

      SHA256

      db246599af1fbb48b3b1b541310a0632ca0a1d3cc4990007632b733a6b5418ae

      SHA512

      89f17a1acdf6d5f9384db2df56a246f97c4ecaee21a76132b044dc18a8260ef78f7ae48ab279df9cf55d0b72413ad24bb65117f4399b31df145bade4d2f20714

    • C:\Users\Admin\AppData\Local\Temp\vikuegq.exe

      Filesize

      3.0MB

      MD5

      8082b0cbee1d15a4233f570e34775085

      SHA1

      5d58989e297a70288f7129ecadff521144f694b6

      SHA256

      db246599af1fbb48b3b1b541310a0632ca0a1d3cc4990007632b733a6b5418ae

      SHA512

      89f17a1acdf6d5f9384db2df56a246f97c4ecaee21a76132b044dc18a8260ef78f7ae48ab279df9cf55d0b72413ad24bb65117f4399b31df145bade4d2f20714

    • C:\Users\Admin\AppData\Local\pgmaouitxjusmrhngzfwcqekyjnzkichx.wpv

      Filesize

      3KB

      MD5

      a22845be2393dfcf6e82367c0fb1d31d

      SHA1

      d59c16265cd1da65ea30f6cf8603e3156253057e

      SHA256

      603bda395d0686662dae9dd18dea11a698289807d62f3222ffa80aa9505f83cd

      SHA512

      f0b3fb705ac2efc2e2a8e5bd63f9ae11bbd0445dc6d50a93789b937ddc3c584e456cfb817fb1e21ab040d54596b037688ee3cc4f91b3218a9ccf39d73fec8181

    • C:\Users\Admin\AppData\Local\yezcfaddwxxktnsnvdyezc.add

      Filesize

      272B

      MD5

      fcd4257b9ad3cc1277bd9eed126d900a

      SHA1

      02b0267a21e445d6b05b2cdccf488191ca6b869f

      SHA256

      acb907c6ed868a718cbf264117a195d324eec0493baf1de53daa3670294a7d9e

      SHA512

      26c95b8214bf2ff1270cb0f924239d7601bfc859d630d8b446e39cfeefe79a37e9636ae007fba4719fadf92df93dbe7a875e9b2e273ca90c717d2cee88b1327f