Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
0e0eff7079eff8797680109cb9fdcb6c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0e0eff7079eff8797680109cb9fdcb6c.exe
Resource
win10v2004-20231215-en
General
-
Target
0e0eff7079eff8797680109cb9fdcb6c.exe
-
Size
1.9MB
-
MD5
0e0eff7079eff8797680109cb9fdcb6c
-
SHA1
875b4b657cfa08d1521fd6d9910962230c2a14b4
-
SHA256
75f5fae8f75dfa54e7ff3dae1fd76234ac2948d91d7238b6458003ec2ed37b70
-
SHA512
c7c3833109bf7458c2e9cd4229d69e37c9823bbe783c64d3b4c4fa0b2c842c73c76ecf280121d400af492ad609aaddbc910dbc5643f9bb2d47b8a023bac7a879
-
SSDEEP
49152:1bF0xWdc/eS4exnHZi18axvXP8l33t1JFCGLvEcTIMMdY17V:ZF0x8c/11HBGv/WHtUQvx/yY15
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\PCenter\\pc.exe" 0e0eff7079eff8797680109cb9fdcb6c.exe -
Executes dropped EXE 1 IoCs
pid Process 3852 agent.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\agent.exe = "C:\\Program Files (x86)\\PCenter\\agent.exe" 0e0eff7079eff8797680109cb9fdcb6c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\PCenter\faq\images\gimg1.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg8.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\pc.exe 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\guide.html 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg3.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg5.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg6.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg9.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\sounds\1.mp3 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\sounds\3.mp3 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg10.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg4.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\agent.exe 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg2.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\faq\images\gimg7.jpg 0e0eff7079eff8797680109cb9fdcb6c.exe File created C:\Program Files (x86)\PCenter\uninstall.exe 0e0eff7079eff8797680109cb9fdcb6c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3852 agent.exe 3852 agent.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3852 agent.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3852 agent.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 3852 4936 0e0eff7079eff8797680109cb9fdcb6c.exe 91 PID 4936 wrote to memory of 3852 4936 0e0eff7079eff8797680109cb9fdcb6c.exe 91 PID 4936 wrote to memory of 3852 4936 0e0eff7079eff8797680109cb9fdcb6c.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0eff7079eff8797680109cb9fdcb6c.exe"C:\Users\Admin\AppData\Local\Temp\0e0eff7079eff8797680109cb9fdcb6c.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files (x86)\PCenter\agent.exe"C:\Program Files (x86)\PCenter\agent.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5893983756a19025823ef5598c3f8a47b
SHA10cc2d67f60ef197dcce35cc1c879fe1d7cf8e619
SHA256cc2756cc651647c911a668eb0a5da3275352ef7b9459790947bced71c11ef495
SHA512f65ed9e247b0364996259dff42ead29f79e5923f707827c2ffb2e2fcde97578c9ca41a23aebb848b50b3914c7bb515598230bc02d8e0ecef7de1eee4fcc5d5cf