Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 17:17

General

  • Target

    fd4a5c01d3b10976ae44029e7672e1b0.exe

  • Size

    672KB

  • MD5

    fd4a5c01d3b10976ae44029e7672e1b0

  • SHA1

    50a8d46d87c47572e6f30dfafd11ce9964c064ab

  • SHA256

    378a19ddfac8651e76b0abb65fb7afd10e973322be7148a8f97adb16dbd057a9

  • SHA512

    ee524662d83f36ce0c5da186e26332b97d2bea4a507734d8a8dbcd8da4732e2e279235481eb9e2b657d84632e7cd7e12070337e1575d0169315b3c5e3829be18

  • SSDEEP

    12288:seBNUbTVO86UCHruRdp+WA00SKCpVRwfXXSVUhbxk9e/pJu:sJIUCNd0nKwYvX+UhbW9eM

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 23 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe
    "C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1408
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:3800
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:1220
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:4456
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:4308
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:1204
    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:3120
    • C:\Windows\System32\msdtc.exe
      C:\Windows\System32\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:1172
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\illlbncb.tmp

      Filesize

      2.0MB

      MD5

      1c1d79ee5342fe7d7e02d42403541866

      SHA1

      0c3d7ecebf2233791e20ca4298290d9ca71da11b

      SHA256

      e7d3a2bb972dde07b56fc615405691756c6568c6e918e603899d3fd38f7f041a

      SHA512

      32eb3600f501a5ced8e5be8e7a96d588f781fe27102679a307e895617e681687ec8474a2e4361cb589032e3e6dafa9ef1934c2ad8049611be8c62c9160d8cba5

    • C:\Users\Admin\AppData\Local\nfejnndr\ealdiamm.tmp

      Filesize

      678KB

      MD5

      297c98168081ffa88bd66541ae3dc8c3

      SHA1

      2e6ba28587e9a1c841e75446e2932edd91f5fda9

      SHA256

      6b8e4ca0f0ff58f5899157138d7a6556d4c0db7728236921751c46d5249b4c8d

      SHA512

      a503698334de6627f0687aa55c295239e68778ae74aef6d9644bcc68bf05f22b680bc34d7d3ed22e5cff3386d325715ee63c2c27e8419be98b0d23215322a9bb

    • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

      Filesize

      487KB

      MD5

      bd91a016511436eb0ea3c25b8147f5d8

      SHA1

      f32125681508baaf1e9556aa58a131a7559d0265

      SHA256

      1514b2fe926c2b4b88d5fb6200e44ffbd5ec7738ab6bf5ea4aed1351e7a71319

      SHA512

      b748dd6f807c10d0245d6f4fd2bd696a0107c9e9c40a370281b00dc2426fd9a67c9ba45744144639b87fdf278919fdf7fa7cf5c599a878b82047b8cda2f3e055

    • C:\Windows\System32\FXSSVC.exe

      Filesize

      1.0MB

      MD5

      e2cfc61ae2be1f0eb310ef7c86bbebfc

      SHA1

      298d379fe409e22b539aa4932604eefd112f4df7

      SHA256

      093bfd9167aa4824fbd28999b2120d5576e38fe439db98303bda7733d837d480

      SHA512

      6be9d4127f2db3dd000dc89ac6e83be5cecac6b6093e72c1328bfd951d4da677e5029177e783a6e40c6441559315c6fecc04098c8ba5bde353d5233a08160ec6

    • C:\Windows\System32\alg.exe

      Filesize

      489KB

      MD5

      03430e7942bb981ef06b6f3e7a0fc353

      SHA1

      92f7442ab8c752c275087b43ad4cfd67582bd957

      SHA256

      2344df425c22db73ce05cdd7a0e89d6e7c4f868f11e6809cda2d9a08b261150a

      SHA512

      9fcc35ad21bb54fabb6c0a5b88364d446409b8d8a05fd7b0d03ad20d4aa785401abeff68338970a8ffd022b4897d763e8580ccdc9897d788d7318efad3e73981

    • C:\Windows\System32\msdtc.exe

      Filesize

      540KB

      MD5

      c2e80a612feb71d235ce73dbf558709b

      SHA1

      9a515cc6560b35f1f5f92c36c25eb8971d037258

      SHA256

      2fea91e2f0a999a93bb0270eeea3b264bc3f8a5db2285ad7a4b67b2c706118e9

      SHA512

      0f0c1c7aef4cfdac09d56843d2f6f36788cc8aab845e7d4da90a60ce2fc8e1558a649b283075c159ed0a56b9444530457c7dc6ad92803902d3f0aea73ddc9f9d

    • C:\Windows\system32\msiexec.exe

      Filesize

      463KB

      MD5

      ceded3d0c5a5281792df36cd2110017a

      SHA1

      215d56cea8d22c5c1d458a9063736eec6a529438

      SHA256

      75eefdd0469f1360217046ac9891fafee1287a4d4277b908c0f72cf4d4e68a68

      SHA512

      8dcca29244bea98d2e3b5572608e5ede4e52dd302d56b3ee0344909db6aabbdcb334671032277cb0b293e28a8de6473c91f89f1eebae1e2716708a0ff4f629c4

    • \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe

      Filesize

      1.9MB

      MD5

      434eaffed1a951b87343f6773e111772

      SHA1

      228bf0f318baca7114b5e5ff975c6ce8620209cd

      SHA256

      a66f652c128286700f80b007979b3b93281b260d46f8d17a80f16a344ca2280f

      SHA512

      28d55818f1683aa398a02c2a5dca15fe118fcf2229af9f083033dded247383223e1aa396d650cd3d4048c30a3aa60b95e864c64e7762baa5e57774f850f72df5

    • \??\c:\program files\common files\microsoft shared\source engine\ose.exe

      Filesize

      384KB

      MD5

      e737c0375862f70b7bf13085e5eb9abc

      SHA1

      0154363d6fe2fe768132d48c89e957c783f743be

      SHA256

      12501b7292ba44c6bfefff54d733763371c3b3b474ae680e565d457f1cb6c1aa

      SHA512

      c3a294ad90156eab6450c2be23377629fe8351a649064f3ba5fe1e0fd00a2ee6efbbea6549acf6b3b7f37c665ff4db427dda8d36a77d63e86ea962c7dea4b498

    • \??\c:\windows\system32\Appvclient.exe

      Filesize

      171KB

      MD5

      c79430412f0c9989e96012e8afe3b8b1

      SHA1

      5a709655dc96f80f2368dca03ebcef181ad06c3a

      SHA256

      ecb1627c954361a2966aa4a033921308036660483cdad45424bfd5fbd06fb606

      SHA512

      196bf281a21930deb07196db86834ec18e1a7c3c03e14380055ac2137849728a37e93efb4f29a25f3d01b521e0fd8243f8bcbb314500a37c7e46f43fb5f7e8f7

    • memory/1172-116-0x00007FF67F590000-0x00007FF67F672000-memory.dmp

      Filesize

      904KB

    • memory/1172-74-0x00007FF67F590000-0x00007FF67F672000-memory.dmp

      Filesize

      904KB

    • memory/1204-49-0x00007FF63FD30000-0x00007FF63FF91000-memory.dmp

      Filesize

      2.4MB

    • memory/1204-114-0x00007FF63FD30000-0x00007FF63FF91000-memory.dmp

      Filesize

      2.4MB

    • memory/1220-32-0x00007FF6B7650000-0x00007FF6B7722000-memory.dmp

      Filesize

      840KB

    • memory/1220-93-0x00007FF6B7650000-0x00007FF6B7722000-memory.dmp

      Filesize

      840KB

    • memory/1408-17-0x00007FF6DBCB0000-0x00007FF6DBDB0000-memory.dmp

      Filesize

      1024KB

    • memory/1408-0-0x00007FF6DBCB0000-0x00007FF6DBDB0000-memory.dmp

      Filesize

      1024KB

    • memory/1408-2-0x00007FF6DBCB0000-0x00007FF6DBDB0000-memory.dmp

      Filesize

      1024KB

    • memory/3120-57-0x00007FF768F10000-0x00007FF769165000-memory.dmp

      Filesize

      2.3MB

    • memory/3120-115-0x00007FF768F10000-0x00007FF769165000-memory.dmp

      Filesize

      2.3MB

    • memory/3800-85-0x00007FF602BA0000-0x00007FF602C73000-memory.dmp

      Filesize

      844KB

    • memory/3800-18-0x00007FF602BA0000-0x00007FF602C73000-memory.dmp

      Filesize

      844KB

    • memory/3800-24-0x00007FF602BA0000-0x00007FF602C73000-memory.dmp

      Filesize

      844KB

    • memory/4308-47-0x00007FF746E30000-0x00007FF746F8F000-memory.dmp

      Filesize

      1.4MB

    • memory/4308-45-0x00007FF746E30000-0x00007FF746F8F000-memory.dmp

      Filesize

      1.4MB

    • memory/4748-86-0x00007FF661F30000-0x00007FF661FFE000-memory.dmp

      Filesize

      824KB

    • memory/4748-122-0x00007FF661F30000-0x00007FF661FFE000-memory.dmp

      Filesize

      824KB