Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2023, 07:18

General

  • Target

    tmp.exe

  • Size

    24.6MB

  • MD5

    3055c62a18308282506fdf461ea9ec89

  • SHA1

    b464491bff51eddb9dd9ca0d10dcefe681e68e78

  • SHA256

    a1843b35c71a0925985276ecced7040cae99d6635b6de7b50cb4630d3f3c2819

  • SHA512

    54b62463d7ad599576e993ae5aa4a5df6472a79be33a7a0198edd7c8daa8f385faf4f8b1976eaeb7e86fb82279e9e469e65580b1d1245d1ec0382830474f4558

  • SSDEEP

    786432:f9z+qZY4h5mcsxmTyjWswiAKO7MTFgCzjvfK9Q:7V5mfCsw3T7MTxzjvfsQ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Adobe\Reader 9.4\Setup Files\setup.exe
      "C:\Users\Admin\AppData\Local\Adobe\Reader 9.4\Setup Files\setup.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe /i "C:\Users\Admin\AppData\Local\Adobe\Reader 9.4\Setup Files\AcroRead.msi" REBOOT="ReallySuppress"
        3⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1760
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D8EE0BB325E39B4930EB7456B3EED2EF C
      2⤵
      • Loads dropped DLL
      PID:4404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\USERS\ADMIN\APPDATA\LOCAL\ADOBE\READER 9.4\SETUP FILES\Abcpy.ini

    Filesize

    1KB

    MD5

    e6fc41debdea75a3f07236ab0c4cc733

    SHA1

    150b34fe408ca67980ef43996a8611b575d0501c

    SHA256

    383148b125d25b72cd369471ac844507b17c59f499eb6cd82d1f654b2b3c0005

    SHA512

    76bd0e6af7cb7af5092f43b3c6fb4c2da2cba2eb23a34e81bd666c7fc007e59fa9c91208a762e3a3045316d36051f1047b03c1251c99911be282babf204d6dcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4DD39726D4B55AC3B4119B35A893323C_46CCCFB940A93F39A734F69EFCDD76E9

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\Local\Adobe\Reader 9.4\Setup Files\AcroRead.msi

    Filesize

    3.8MB

    MD5

    33e4ac38fb717295d9eeb24f3faf4b43

    SHA1

    a5e6da15b7593e3eb1e2d1ab39607f97db69dc2b

    SHA256

    1737c86c979591a53eda1855e543bbde81c0839aa9de41cbded7677e88e36044

    SHA512

    47830ca01b2baf46e0b7d6ad625a950fd01716c39926751c5fc5cde722a21acf68bcd36a44393e82373d518cf05026c6574378274fa48f678baffad4dde0eae5

  • C:\Users\Admin\AppData\Local\Adobe\Reader 9.4\Setup Files\Setup.exe

    Filesize

    337KB

    MD5

    c490bb035d06cc769efde3d3a0d707de

    SHA1

    75bed88153483a02cd16ce13bcb4d187b7b58669

    SHA256

    6f9f100ea83e8bd856050285d564297b3fa7939376dff25a33b57f82f2f3a663

    SHA512

    9199d1ffbfbf704da2831d826f1d89ca044a76acb8b6e734d63903b6d8e84e2a76242454eed49ac5244ccdcd3f25b825ee7dacecebdedd50f1f644d808533969

  • C:\Users\Admin\AppData\Local\Adobe\Reader 9.4\Setup Files\Setup.exe

    Filesize

    337KB

    MD5

    c490bb035d06cc769efde3d3a0d707de

    SHA1

    75bed88153483a02cd16ce13bcb4d187b7b58669

    SHA256

    6f9f100ea83e8bd856050285d564297b3fa7939376dff25a33b57f82f2f3a663

    SHA512

    9199d1ffbfbf704da2831d826f1d89ca044a76acb8b6e734d63903b6d8e84e2a76242454eed49ac5244ccdcd3f25b825ee7dacecebdedd50f1f644d808533969

  • C:\Users\Admin\AppData\Local\Adobe\Reader 9.4\Setup Files\setup.exe

    Filesize

    337KB

    MD5

    c490bb035d06cc769efde3d3a0d707de

    SHA1

    75bed88153483a02cd16ce13bcb4d187b7b58669

    SHA256

    6f9f100ea83e8bd856050285d564297b3fa7939376dff25a33b57f82f2f3a663

    SHA512

    9199d1ffbfbf704da2831d826f1d89ca044a76acb8b6e734d63903b6d8e84e2a76242454eed49ac5244ccdcd3f25b825ee7dacecebdedd50f1f644d808533969

  • C:\Users\Admin\AppData\Local\Adobe\Reader 9.4\Setup Files\setup.ini

    Filesize

    294B

    MD5

    8afb9ba1810f06880b98baadf822fca5

    SHA1

    3d5126fd4b54d4c2fab69f6e8d238dc9af1c26c7

    SHA256

    baed77b9ddfcf33e1b12b83d3bc7df95444d5258550ba22ca430176014fdb77f

    SHA512

    b98f51fcef5cc59319c1a4a29b50e23346840ece17540ac42ec5633af82bc538460c80dda0f43a0023745f5b42954416a8504d1573e55058b5211f470fcce777

  • C:\Users\Admin\AppData\Local\Temp\MSIA7C9.tmp

    Filesize

    52KB

    MD5

    4a908ee9c6f2f4aad63382cccee731e4

    SHA1

    e572580949f277987fe232757ce88c2ac35e0223

    SHA256

    459f503fb8b4fc4a600261430ac77bf70118d41fa19f7b2620d43ba6e9c8fa5e

    SHA512

    75ba5856df7ed1457b6192e3b12c5dbb9cd0c6860d787357b37d5e2aabdd1dddb1fd6195064cad1b166431a71dee233b76cb6304d8e868050d79c731ef6e567f

  • C:\Users\Admin\AppData\Local\Temp\MSIA7C9.tmp

    Filesize

    52KB

    MD5

    4a908ee9c6f2f4aad63382cccee731e4

    SHA1

    e572580949f277987fe232757ce88c2ac35e0223

    SHA256

    459f503fb8b4fc4a600261430ac77bf70118d41fa19f7b2620d43ba6e9c8fa5e

    SHA512

    75ba5856df7ed1457b6192e3b12c5dbb9cd0c6860d787357b37d5e2aabdd1dddb1fd6195064cad1b166431a71dee233b76cb6304d8e868050d79c731ef6e567f

  • C:\Users\Admin\AppData\Local\Temp\MSIA8A5.tmp

    Filesize

    96KB

    MD5

    fadffef98d0f28368b843c6e9afd9782

    SHA1

    578101fadf1034c4a928b978260b120b740cdfb9

    SHA256

    73f7e51214b775421f6679acabc51ac1d34b4271116f5f3dd3426df50d214886

    SHA512

    ba5ab56a7e5d2e54fc304d77c78a14b35b187fdd95a090d39193b3da6ab40ef1b38c3cd56b160edceded3d622c0b645376efaf3df8fc8c437f448f91587f3233

  • C:\Users\Admin\AppData\Local\Temp\MSIA8A5.tmp

    Filesize

    96KB

    MD5

    fadffef98d0f28368b843c6e9afd9782

    SHA1

    578101fadf1034c4a928b978260b120b740cdfb9

    SHA256

    73f7e51214b775421f6679acabc51ac1d34b4271116f5f3dd3426df50d214886

    SHA512

    ba5ab56a7e5d2e54fc304d77c78a14b35b187fdd95a090d39193b3da6ab40ef1b38c3cd56b160edceded3d622c0b645376efaf3df8fc8c437f448f91587f3233

  • C:\Users\Admin\AppData\Local\Temp\MSIA8C5.tmp

    Filesize

    85KB

    MD5

    43623ef978845c1388f7fe91d9cbeeee

    SHA1

    71c53cb7ee2ed1b45ff690dfd4a79f9a8903b5db

    SHA256

    4581d04e799c426fbf39506d3a376d51dd49db7c89a6fad614c1f88a9b4b4c04

    SHA512

    34e244585f61171a07db0901d902bc0909f1d936419ba1f066f3065222d022d2ef903801b0ecd0042676a704feac916ec7b2a0f81a7caaac57c80721b1db9352

  • C:\Users\Admin\AppData\Local\Temp\MSIA8C5.tmp

    Filesize

    85KB

    MD5

    43623ef978845c1388f7fe91d9cbeeee

    SHA1

    71c53cb7ee2ed1b45ff690dfd4a79f9a8903b5db

    SHA256

    4581d04e799c426fbf39506d3a376d51dd49db7c89a6fad614c1f88a9b4b4c04

    SHA512

    34e244585f61171a07db0901d902bc0909f1d936419ba1f066f3065222d022d2ef903801b0ecd0042676a704feac916ec7b2a0f81a7caaac57c80721b1db9352

  • memory/2432-0-0x0000000000F20000-0x0000000000F7F000-memory.dmp

    Filesize

    380KB

  • memory/2432-51-0x0000000000F20000-0x0000000000F7F000-memory.dmp

    Filesize

    380KB