Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2023, 11:54

General

  • Target

    2024税务总局关于企业和个人所得税新政策 .exe

  • Size

    203KB

  • MD5

    01059b0a810a040b435a9bd540880d09

  • SHA1

    a17dfd4c1a248ec2ebbffb53f62aecba71f32de0

  • SHA256

    5b1c60e43cf34f5c5894438362d52fd8280b0b4061d70d171ba2dae40d764d84

  • SHA512

    1181d2929f9c75140beab13f54dd3518930420446d433112b52a99fbca15b091bce0eba5e80bacb5e37cd753a102ae869a254ea34b9678cf0de31b0fe0a82cbd

  • SSDEEP

    3072:DE+COyprOTLLvfkgev+oHvE0bMzhHkFTeVxLsc7bZJMs0yDpDkvhxBh:DzQprOTLbkgONvZ4hHD3Z7kvV

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Modifies RDP port number used by Windows 1 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024税务总局关于企业和个人所得税新政策 .exe
    "C:\Users\Admin\AppData\Local\Temp\2024税务总局关于企业和个人所得税新政策 .exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Roaming\e1kMZcKXr\rM2Nc6r.exe
      "C:\Users\Admin\AppData\Roaming\e1kMZcKXr\rM2Nc6r.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3216
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo.>c:\xxxx.ini
        3⤵
          PID:3596
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 1472
        2⤵
        • Program crash
        PID:3880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4616 -ip 4616
      1⤵
        PID:3848

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\_ir_tu2_temp_0\IRIMG3.JPG

        Filesize

        6KB

        MD5

        e39405e85e09f64ccde0f59392317dd3

        SHA1

        9c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b

        SHA256

        cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f

        SHA512

        6733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a

      • C:\Users\Admin\AppData\Local\Temp\_ir_tu2_temp_0\IRIMG4.JPG

        Filesize

        36KB

        MD5

        f6bf82a293b69aa5b47d4e2de305d45a

        SHA1

        4948716616d4bbe68be2b4c5bf95350402d3f96f

        SHA256

        6a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0

        SHA512

        edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa

      • C:\Users\Admin\AppData\Roaming\e1kMZcKXr\Edge.jpg

        Filesize

        358KB

        MD5

        3c77248957db6f300076c95ea0f35d6c

        SHA1

        a5d0968189889eacc810defa8f1b1c1be29fe123

        SHA256

        37bd9e6fdf9f5830461fcd2efec8a33f5912bdd34cd6f620f544351eb817a4db

        SHA512

        98200a230c587cdef9dca80457982225b228acc6b6e09daf5b3f9a90d3378f7faedc4916049f3e5d18927d969884ce78165ba636ee4417dc3c324dedfb5aff2c

      • C:\Users\Admin\AppData\Roaming\e1kMZcKXr\edge.xml

        Filesize

        78KB

        MD5

        f126ab00979b9ffe006b4cdd33b36128

        SHA1

        905affb858b82e99ff581b0d93f1ff75d5482564

        SHA256

        ce75f55edb34369667b0f47592ad49608ce580808cdf0b2dbf4de30bf63fedc4

        SHA512

        b37807404ecfe9e6b7f6f49b2ca7899484c07f46d9d120136e5f58c737a74c053165b99eb50de11b971d51e2fa137e624571bcf7d29760bdf789acfc02007d40

      • C:\Users\Admin\AppData\Roaming\e1kMZcKXr\rM2Nc6r.dat

        Filesize

        132KB

        MD5

        42ba2bf20dc6cf3cf5454211450331bc

        SHA1

        a068cf4fa80f5e90ab445ff8c1032e157847002c

        SHA256

        5172cea75e95338d1870c1205614faf2f5ffe2d9baf385e28028c8467fb2041e

        SHA512

        d35c2deff604dd976c3099860bc210e25b4755899a3b664efadebec991cb3f51a3f08c34deee0c5280a66abb793b378fd33b7ef2e0c6ed416c6025b81beb9ccb

      • C:\Users\Admin\AppData\Roaming\e1kMZcKXr\rM2Nc6r.exe

        Filesize

        525KB

        MD5

        fc405097a8783a67ba3ca59e7a871dd0

        SHA1

        89ac6ae1bfde054f02bdab4329a2dfb91b1d9a8e

        SHA256

        3b682a7f9f14b8acf7afe255d59f907ee355c5d9615cce9054c4a642d59028c0

        SHA512

        d4565decd6df0dbb2c57a2c08f85158693f8afa99cb92845356fca73bec25e35431b7e1ca146086da3c663153fbc58b23f8beadae88ebd26235a627906c6b946

      • C:\Users\Admin\AppData\Roaming\e1kMZcKXr\rM2Nc6r.exe

        Filesize

        525KB

        MD5

        fc405097a8783a67ba3ca59e7a871dd0

        SHA1

        89ac6ae1bfde054f02bdab4329a2dfb91b1d9a8e

        SHA256

        3b682a7f9f14b8acf7afe255d59f907ee355c5d9615cce9054c4a642d59028c0

        SHA512

        d4565decd6df0dbb2c57a2c08f85158693f8afa99cb92845356fca73bec25e35431b7e1ca146086da3c663153fbc58b23f8beadae88ebd26235a627906c6b946

      • C:\Users\Admin\AppData\Roaming\e1kMZcKXr\rM2Nc6r.exe

        Filesize

        525KB

        MD5

        fc405097a8783a67ba3ca59e7a871dd0

        SHA1

        89ac6ae1bfde054f02bdab4329a2dfb91b1d9a8e

        SHA256

        3b682a7f9f14b8acf7afe255d59f907ee355c5d9615cce9054c4a642d59028c0

        SHA512

        d4565decd6df0dbb2c57a2c08f85158693f8afa99cb92845356fca73bec25e35431b7e1ca146086da3c663153fbc58b23f8beadae88ebd26235a627906c6b946

      • memory/3216-45-0x0000000002D60000-0x0000000002D61000-memory.dmp

        Filesize

        4KB

      • memory/3216-47-0x00000000038B0000-0x00000000038C7000-memory.dmp

        Filesize

        92KB

      • memory/3216-22-0x0000000000400000-0x0000000000558000-memory.dmp

        Filesize

        1.3MB

      • memory/3216-50-0x0000000010000000-0x0000000010061000-memory.dmp

        Filesize

        388KB

      • memory/3216-64-0x0000000000400000-0x0000000000558000-memory.dmp

        Filesize

        1.3MB

      • memory/3216-66-0x00000000038B0000-0x00000000038C7000-memory.dmp

        Filesize

        92KB

      • memory/4616-1-0x0000000010000000-0x0000000010018000-memory.dmp

        Filesize

        96KB