Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2023, 00:33

General

  • Target

    041a8f8f1bae4decc9d995d124af170a6ff8ecb80a5338fb2421eeac232ae6fc.exe

  • Size

    399KB

  • MD5

    4b24f57f224315d69492a029ed43a92f

  • SHA1

    bc9724527b74aac48a4c94f7ae7c4f83a5ee8c0d

  • SHA256

    041a8f8f1bae4decc9d995d124af170a6ff8ecb80a5338fb2421eeac232ae6fc

  • SHA512

    f9526da1252c24f19159078ca4affb35edbd7d65dbfd1c6cd11d549ff9c22bd8e453f4742a11dc6ad7f6d9845806526898418f7ea13b2b5620f3af4617c91470

  • SSDEEP

    6144:YZmsQhU+bZVx5rLKJzu6gLP44ZwcDy/qF6cEOkCybEaQRXr9HNdvOapLF:8UF30Ngj44ecDyfOkx2LIapLF

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 9 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:628
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:332
      • C:\Program Files\recdisc.exe
        "C:\Program Files\recdisc.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3172
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Users\Admin\AppData\Local\Temp\041a8f8f1bae4decc9d995d124af170a6ff8ecb80a5338fb2421eeac232ae6fc.exe
        "C:\Users\Admin\AppData\Local\Temp\041a8f8f1bae4decc9d995d124af170a6ff8ecb80a5338fb2421eeac232ae6fc.exe"
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\041a8f8f1bae4decc9d995d124af170a6ff8ecb80a5338fb2421eeac232ae6fc.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2176
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:4500

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\recdisc.exe

      Filesize

      193KB

      MD5

      18afee6824c84bf5115bada75ff0a3e7

      SHA1

      d10f287a7176f57b3b2b315a5310d25b449795aa

      SHA256

      0787b37cf197595b8149ffe3784f9c59eacde3616011f185513ff5c075a5ac4e

      SHA512

      517356165b401dbebf15437d3b17746aef5a6a4cc62a0afe45966abc92b4cf377eee4514a36ee28b1e88e55a22a2f8a6c997df45971e7f354b66ac7d9e141845

    • C:\Program Files\recdisc.exe

      Filesize

      193KB

      MD5

      18afee6824c84bf5115bada75ff0a3e7

      SHA1

      d10f287a7176f57b3b2b315a5310d25b449795aa

      SHA256

      0787b37cf197595b8149ffe3784f9c59eacde3616011f185513ff5c075a5ac4e

      SHA512

      517356165b401dbebf15437d3b17746aef5a6a4cc62a0afe45966abc92b4cf377eee4514a36ee28b1e88e55a22a2f8a6c997df45971e7f354b66ac7d9e141845

    • C:\Users\Admin\AppData\Local\Temp\833eab8e.tmp

      Filesize

      14.1MB

      MD5

      3acf3e8466847b7da3cb2ddd83079c22

      SHA1

      d058f4dcb913025b0a1ef5d9e87266aca62b8c8a

      SHA256

      cb4d779c782c006ed13ba4a4b11aaf31650c46f9ff8abb8771ed6bf1754cc9f1

      SHA512

      425f0516a7d401bd6459383d031b05dc52459e38599cea5afa964772897bc1dbd9ac6fc70fed1cc7b9816e149e26fe8b16cead837bf23a7a595d2e3c11fb9c7f

    • C:\Windows\HcpuVeNIFqhTg.sys

      Filesize

      165KB

      MD5

      a9147d9136c83671340463124184052c

      SHA1

      e6cb150312bc325ff89030b75ba9c5da9bd24760

      SHA256

      ca5e6188650898e3481ba599a737bb8bf3ad23e2bfffb15a34e55b5fc3e36188

      SHA512

      9aa4f70a8399a9e56ceedf418e77d1cc731a05fa53d25667604f11500211c643486ceb79b6f8ddcda52955d7da0083838d103992ae77770695aba1b7eb2cd009

    • C:\Windows\lAZIKRccFTTuf.sys

      Filesize

      165KB

      MD5

      cc278a89d1f76e74bcd131ccea4a14ab

      SHA1

      14477e772ed63f4130611066cec7aee6062c9f83

      SHA256

      63c2abf2fdd410129ffb26630188c1cb786cf1cf8d921181a6b1fa86316ac21b

      SHA512

      bcab37bcb1133b9eff7713af7d43b8084da66b4cb9b890cc6d34e3a391ecd9f4c9116e3051cd5b64f1c03e3fc03ffb4caebc4be7e036fd7f21cbf4bea7c0e7b3

    • C:\Windows\tpYjAURwI9.sys

      Filesize

      165KB

      MD5

      e89bccb4de3b18b0d9e5e6da29e60873

      SHA1

      09b81d7f8a893d41a82a78e2835e2676bff8cbc4

      SHA256

      65489278d2b259f3e3bc9c08bd4318308a2169bf8740d1ad737177913cc0fa48

      SHA512

      530b4d5de3b3dcfb0b2c78c583df0944c3d9516c567cc776b8fe9f3e5bc24e1bfe704bd76d2cb0502361db6b63f48cbf961b033a5fa2bbf94fdf737c1724a35c

    • C:\Windows\whBeE93JS5.sys

      Filesize

      165KB

      MD5

      240fe254754a2fe23cfb1dfb7ab292d9

      SHA1

      dd4945ee3955c1bb1e2a54aa13a235b41ffae57a

      SHA256

      466fdedb0a54e3502f3d1a8cac0646729c55f17a808fcfb51c8cb489012fa978

      SHA512

      5a418e34ba794c11203a174e47f1a822b42efd452d3bcf1a6e656f6b970a08f1e4b42d1aab08866f5b08348114343803a8baa47946d725bfdde069757099a739

    • memory/332-319-0x00000229683E0000-0x00000229683E4000-memory.dmp

      Filesize

      16KB

    • memory/332-317-0x0000022968290000-0x00000229683B3000-memory.dmp

      Filesize

      1.1MB

    • memory/332-318-0x00000229683D0000-0x00000229683D1000-memory.dmp

      Filesize

      4KB

    • memory/332-326-0x0000022968290000-0x00000229683B3000-memory.dmp

      Filesize

      1.1MB

    • memory/628-15-0x000001DDCDA70000-0x000001DDCDA73000-memory.dmp

      Filesize

      12KB

    • memory/628-18-0x000001DDCDAC0000-0x000001DDCDAC1000-memory.dmp

      Filesize

      4KB

    • memory/628-17-0x000001DDCDA80000-0x000001DDCDAA8000-memory.dmp

      Filesize

      160KB

    • memory/628-80-0x000001DDCDA80000-0x000001DDCDAA8000-memory.dmp

      Filesize

      160KB

    • memory/3172-71-0x0000026324110000-0x0000026324233000-memory.dmp

      Filesize

      1.1MB

    • memory/3172-49-0x00007FFC0A7B0000-0x00007FFC0A7C0000-memory.dmp

      Filesize

      64KB

    • memory/3172-52-0x0000026321650000-0x0000026321651000-memory.dmp

      Filesize

      4KB

    • memory/3172-54-0x0000026321650000-0x0000026321651000-memory.dmp

      Filesize

      4KB

    • memory/3172-55-0x0000026321660000-0x0000026321661000-memory.dmp

      Filesize

      4KB

    • memory/3172-56-0x0000026321650000-0x0000026321651000-memory.dmp

      Filesize

      4KB

    • memory/3172-57-0x0000026321650000-0x0000026321651000-memory.dmp

      Filesize

      4KB

    • memory/3172-58-0x0000026321650000-0x0000026321651000-memory.dmp

      Filesize

      4KB

    • memory/3172-59-0x0000026321650000-0x0000026321651000-memory.dmp

      Filesize

      4KB

    • memory/3172-324-0x0000026325900000-0x0000026325901000-memory.dmp

      Filesize

      4KB

    • memory/3172-61-0x0000026322690000-0x0000026322855000-memory.dmp

      Filesize

      1.8MB

    • memory/3172-65-0x0000026321500000-0x00000263215CB000-memory.dmp

      Filesize

      812KB

    • memory/3172-66-0x0000026321420000-0x0000026321421000-memory.dmp

      Filesize

      4KB

    • memory/3172-323-0x0000026322680000-0x0000026322681000-memory.dmp

      Filesize

      4KB

    • memory/3172-10-0x0000026321500000-0x00000263215CB000-memory.dmp

      Filesize

      812KB

    • memory/3172-73-0x0000026321650000-0x0000026321651000-memory.dmp

      Filesize

      4KB

    • memory/3172-309-0x0000026325910000-0x0000026325911000-memory.dmp

      Filesize

      4KB

    • memory/3172-83-0x0000026322610000-0x0000026322611000-memory.dmp

      Filesize

      4KB

    • memory/3172-50-0x0000026321640000-0x0000026321641000-memory.dmp

      Filesize

      4KB

    • memory/3172-88-0x0000026321640000-0x0000026321641000-memory.dmp

      Filesize

      4KB

    • memory/3172-93-0x0000026321660000-0x0000026321661000-memory.dmp

      Filesize

      4KB

    • memory/3172-105-0x0000026321680000-0x0000026321681000-memory.dmp

      Filesize

      4KB

    • memory/3172-130-0x0000026322690000-0x0000026322855000-memory.dmp

      Filesize

      1.8MB

    • memory/3172-53-0x0000026321660000-0x0000026321661000-memory.dmp

      Filesize

      4KB

    • memory/3172-12-0x0000026321500000-0x00000263215CB000-memory.dmp

      Filesize

      812KB

    • memory/3172-13-0x0000026321420000-0x0000026321421000-memory.dmp

      Filesize

      4KB

    • memory/3172-11-0x00007FFC0A7B0000-0x00007FFC0A7C0000-memory.dmp

      Filesize

      64KB

    • memory/3280-5-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/3280-299-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/3280-153-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/3280-301-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/3280-308-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/3280-51-0x00000000084D0000-0x00000000085C7000-memory.dmp

      Filesize

      988KB

    • memory/3280-314-0x00000000030D0000-0x00000000030D3000-memory.dmp

      Filesize

      12KB

    • memory/3280-316-0x0000000003120000-0x0000000003121000-memory.dmp

      Filesize

      4KB

    • memory/3280-0-0x0000000002ED0000-0x0000000002ED3000-memory.dmp

      Filesize

      12KB

    • memory/3280-315-0x0000000008C50000-0x0000000008D73000-memory.dmp

      Filesize

      1.1MB

    • memory/3280-321-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/3280-3-0x00000000084D0000-0x00000000085C7000-memory.dmp

      Filesize

      988KB

    • memory/3280-179-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/3280-320-0x0000000003130000-0x0000000003131000-memory.dmp

      Filesize

      4KB

    • memory/3280-322-0x0000000008EA0000-0x0000000008EA4000-memory.dmp

      Filesize

      16KB

    • memory/3280-64-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/3280-60-0x00000000030D0000-0x00000000030D1000-memory.dmp

      Filesize

      4KB

    • memory/3280-325-0x0000000008C50000-0x0000000008D73000-memory.dmp

      Filesize

      1.1MB

    • memory/3280-2-0x0000000002ED0000-0x0000000002ED3000-memory.dmp

      Filesize

      12KB

    • memory/3280-1-0x0000000002ED0000-0x0000000002ED3000-memory.dmp

      Filesize

      12KB