Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
2024税务总局关于企业和个人所得税新政策 .exe
Resource
win7-20231023-en
General
-
Target
2024税务总局关于企业和个人所得税新政策 .exe
-
Size
203KB
-
MD5
01059b0a810a040b435a9bd540880d09
-
SHA1
a17dfd4c1a248ec2ebbffb53f62aecba71f32de0
-
SHA256
5b1c60e43cf34f5c5894438362d52fd8280b0b4061d70d171ba2dae40d764d84
-
SHA512
1181d2929f9c75140beab13f54dd3518930420446d433112b52a99fbca15b091bce0eba5e80bacb5e37cd753a102ae869a254ea34b9678cf0de31b0fe0a82cbd
-
SSDEEP
3072:DE+COyprOTLLvfkgev+oHvE0bMzhHkFTeVxLsc7bZJMs0yDpDkvhxBh:DzQprOTLbkgONvZ4hHD3Z7kvV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" rM2Nc6r.exe -
Downloads MZ/PE file
-
Modifies RDP port number used by Windows 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation 2024税务总局关于企业和个人所得税新政策 .exe -
Executes dropped EXE 1 IoCs
pid Process 3216 rM2Nc6r.exe -
resource yara_rule behavioral2/files/0x0006000000022ce0-15.dat upx behavioral2/files/0x0006000000022ce0-21.dat upx behavioral2/files/0x0006000000022ce0-23.dat upx behavioral2/memory/3216-22-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral2/memory/3216-64-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3880 4616 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rM2Nc6r.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rM2Nc6r.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4616 2024税务总局关于企业和个人所得税新政策 .exe 4616 2024税务总局关于企业和个人所得税新政策 .exe 4616 2024税务总局关于企业和个人所得税新政策 .exe 4616 2024税务总局关于企业和个人所得税新政策 .exe 4616 2024税务总局关于企业和个人所得税新政策 .exe 4616 2024税务总局关于企业和个人所得税新政策 .exe 4616 2024税务总局关于企业和个人所得税新政策 .exe 4616 2024税务总局关于企业和个人所得税新政策 .exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe 3216 rM2Nc6r.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4616 wrote to memory of 3216 4616 2024税务总局关于企业和个人所得税新政策 .exe 93 PID 4616 wrote to memory of 3216 4616 2024税务总局关于企业和个人所得税新政策 .exe 93 PID 4616 wrote to memory of 3216 4616 2024税务总局关于企业和个人所得税新政策 .exe 93 PID 3216 wrote to memory of 3596 3216 rM2Nc6r.exe 98 PID 3216 wrote to memory of 3596 3216 rM2Nc6r.exe 98 PID 3216 wrote to memory of 3596 3216 rM2Nc6r.exe 98 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" rM2Nc6r.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024税务总局关于企业和个人所得税新政策 .exe"C:\Users\Admin\AppData\Local\Temp\2024税务总局关于企业和个人所得税新政策 .exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Roaming\e1kMZcKXr\rM2Nc6r.exe"C:\Users\Admin\AppData\Roaming\e1kMZcKXr\rM2Nc6r.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3216 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\xxxx.ini3⤵PID:3596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 14722⤵
- Program crash
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4616 -ip 46161⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e39405e85e09f64ccde0f59392317dd3
SHA19c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b
SHA256cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f
SHA5126733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a
-
Filesize
36KB
MD5f6bf82a293b69aa5b47d4e2de305d45a
SHA14948716616d4bbe68be2b4c5bf95350402d3f96f
SHA2566a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0
SHA512edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa
-
Filesize
358KB
MD53c77248957db6f300076c95ea0f35d6c
SHA1a5d0968189889eacc810defa8f1b1c1be29fe123
SHA25637bd9e6fdf9f5830461fcd2efec8a33f5912bdd34cd6f620f544351eb817a4db
SHA51298200a230c587cdef9dca80457982225b228acc6b6e09daf5b3f9a90d3378f7faedc4916049f3e5d18927d969884ce78165ba636ee4417dc3c324dedfb5aff2c
-
Filesize
78KB
MD5f126ab00979b9ffe006b4cdd33b36128
SHA1905affb858b82e99ff581b0d93f1ff75d5482564
SHA256ce75f55edb34369667b0f47592ad49608ce580808cdf0b2dbf4de30bf63fedc4
SHA512b37807404ecfe9e6b7f6f49b2ca7899484c07f46d9d120136e5f58c737a74c053165b99eb50de11b971d51e2fa137e624571bcf7d29760bdf789acfc02007d40
-
Filesize
132KB
MD542ba2bf20dc6cf3cf5454211450331bc
SHA1a068cf4fa80f5e90ab445ff8c1032e157847002c
SHA2565172cea75e95338d1870c1205614faf2f5ffe2d9baf385e28028c8467fb2041e
SHA512d35c2deff604dd976c3099860bc210e25b4755899a3b664efadebec991cb3f51a3f08c34deee0c5280a66abb793b378fd33b7ef2e0c6ed416c6025b81beb9ccb
-
Filesize
525KB
MD5fc405097a8783a67ba3ca59e7a871dd0
SHA189ac6ae1bfde054f02bdab4329a2dfb91b1d9a8e
SHA2563b682a7f9f14b8acf7afe255d59f907ee355c5d9615cce9054c4a642d59028c0
SHA512d4565decd6df0dbb2c57a2c08f85158693f8afa99cb92845356fca73bec25e35431b7e1ca146086da3c663153fbc58b23f8beadae88ebd26235a627906c6b946
-
Filesize
525KB
MD5fc405097a8783a67ba3ca59e7a871dd0
SHA189ac6ae1bfde054f02bdab4329a2dfb91b1d9a8e
SHA2563b682a7f9f14b8acf7afe255d59f907ee355c5d9615cce9054c4a642d59028c0
SHA512d4565decd6df0dbb2c57a2c08f85158693f8afa99cb92845356fca73bec25e35431b7e1ca146086da3c663153fbc58b23f8beadae88ebd26235a627906c6b946
-
Filesize
525KB
MD5fc405097a8783a67ba3ca59e7a871dd0
SHA189ac6ae1bfde054f02bdab4329a2dfb91b1d9a8e
SHA2563b682a7f9f14b8acf7afe255d59f907ee355c5d9615cce9054c4a642d59028c0
SHA512d4565decd6df0dbb2c57a2c08f85158693f8afa99cb92845356fca73bec25e35431b7e1ca146086da3c663153fbc58b23f8beadae88ebd26235a627906c6b946