Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.exe
Resource
win10v2004-20231130-en
General
-
Target
SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.exe
-
Size
6.9MB
-
MD5
863883064e5b23b07269146219bdf8d3
-
SHA1
2d0d0f57409fa05ed5f98440755e09784553ee38
-
SHA256
ac672b52f11d93354762e1354eebfb41e9c5ae4778f95cc0191926fdb891c02a
-
SHA512
3c8ed628c343b4a54171583f20dd2d1a8b19cdc42e08400440e0f22d8424a81d7433d14c314c264f72903ed3ab99d57368673d1afa376a379ac397a60c190ca0
-
SSDEEP
196608:NRW8Bq+q3WGhRQY914E1DF+V3bm/LCGNq3eUeKP3gdVfzj:NQeqbhPK4DFY4CtOUYVfzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 3864 wmaformat.exe 1020 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 81.31.197.38 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\WMAFormat\uninstall\is-GD8ND.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-S27AS.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-EAEVL.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-V7T1O.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-LTK32.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-5L0OB.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CINV3.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-DJKE1.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8GITU.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-K14VA.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-BACLM.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3CGN9.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IMIG9.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4UVR2.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-BCI98.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4L1Q3.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QCGGK.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-COBVT.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-O9105.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-M89NE.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-6590F.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-88178.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QAQQP.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-I61FP.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MRNIM.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-O41DF.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-77CVU.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HEVD0.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9N1DE.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\is-VKU9F.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-NA7KT.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TIT4D.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9FC5T.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TMC28.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4FE2N.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MKDNM.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9HVMR.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SSG5B.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AT0G9.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-LPRTD.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-T7EJ9.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-T0PUK.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3RV25.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FD695.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-8M2FE.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-6DUQL.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VK23I.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SJ3RH.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-NLHFS.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-BQETV.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-U0C7J.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-N2GS1.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7EBMJ.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-20UCO.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-5MNIU.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VJMUU.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-L0PPC.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-M6GIM.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-99PQH.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CUN6I.tmp SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2560 4580 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.exe 87 PID 4580 wrote to memory of 2560 4580 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.exe 87 PID 4580 wrote to memory of 2560 4580 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.exe 87 PID 2560 wrote to memory of 2984 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 89 PID 2560 wrote to memory of 2984 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 89 PID 2560 wrote to memory of 2984 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 89 PID 2560 wrote to memory of 3864 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 91 PID 2560 wrote to memory of 3864 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 91 PID 2560 wrote to memory of 3864 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 91 PID 2560 wrote to memory of 3556 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 95 PID 2560 wrote to memory of 3556 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 95 PID 2560 wrote to memory of 3556 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 95 PID 2560 wrote to memory of 1020 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 94 PID 2560 wrote to memory of 1020 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 94 PID 2560 wrote to memory of 1020 2560 SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp 94 PID 3556 wrote to memory of 3980 3556 net.exe 93 PID 3556 wrote to memory of 3980 3556 net.exe 93 PID 3556 wrote to memory of 3980 3556 net.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\is-FLRBB.tmp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp"C:\Users\Admin\AppData\Local\Temp\is-FLRBB.tmp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp" /SL5="$901C6,6953145,68096,C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:2984
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:3864
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:1020
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:3556
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 111⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD597aca9a22c40227d16b133825698ac4e
SHA177b09a6b5eca82db7e2a45767fd4c361eff4685f
SHA2566dd75b4bb9f6bac3848e257dcbc658b93849c5ddd8d3ea79310e56cc4909b6b4
SHA5121566a1d1abe38e7d10d4e0cfc1a7e702646a492286abedffa31682a41e9dd197ea92e6ec8d7154373cae83654d8f838587dc1e6f20f223ee9cccf15e0d63b7b1
-
Filesize
471KB
MD5ac8f428d2c1a6f35e222861404b0cd80
SHA19c6b9978d717fc7b02320cc517575b48df20415f
SHA25647e8b59917ab54b507956ebe42378003401ed2d59ba5e248fde4914ec74e7af5
SHA51213f9d8d945f92b5f8b8f6068c0f5dfd9a63c5ef52aa4904855418b91c40faa4c833b0dec6f55f7d19e38343b08068decbe554e94c3f8151c20749038e9a6ef4f
-
Filesize
223KB
MD52314c7ba361cd2ab49702055ebc22790
SHA10d222f218f3ad53e2b9053d87c293879f010a401
SHA2561b2d996a7cd71f9f81abe72e0173b163e30936bb741e6f081287f10d31ffb12e
SHA5123373da9af8b807f91e5091440c7ce1bcd4d0bef24ab6099596abf685e700fecafc6b193f20c0e4470936ada82476d7e5b6881e1203313fbeec1cd9db98df3829
-
C:\Users\Admin\AppData\Local\Temp\is-FLRBB.tmp\SecuriteInfo.com.Heuristic.HEUR.AGEN.1332570.4066.27732.tmp
Filesize687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303