Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
121f406624b9995f3f19c5dcfeab6a66.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
121f406624b9995f3f19c5dcfeab6a66.exe
Resource
win10v2004-20231215-en
General
-
Target
121f406624b9995f3f19c5dcfeab6a66.exe
-
Size
215KB
-
MD5
121f406624b9995f3f19c5dcfeab6a66
-
SHA1
1327fa593578ed4b90743427aa839293e25166f7
-
SHA256
d00b8527779d3014b49708450eaed5cff5804f68944fad8c501f81c7ef83713e
-
SHA512
5d3686b098838b50e5d01d80b7594f54a82bf9f9f716d7a2e9cba9049adb39899e48d29592a73146248728e603aefd72acda70c4ad1985266f1008660cbbb9a4
-
SSDEEP
6144:LS/ECKgcKNc+fwb1/d8eLCWLz8/Gs+nFeHT:hvgIdKeOWXyGs+nOT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 121f406624b9995f3f19c5dcfeab6a66.exe -
Executes dropped EXE 3 IoCs
pid Process 3108 ~DP4FE5.exe 5072 ~DP50C1.exe 4656 winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\~DP4FE5.exe" ~DP4FE5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\winlogon.exe ~DP4FE5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2308 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2308 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4656 winlogon.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3308 wrote to memory of 3108 3308 121f406624b9995f3f19c5dcfeab6a66.exe 21 PID 3308 wrote to memory of 3108 3308 121f406624b9995f3f19c5dcfeab6a66.exe 21 PID 3308 wrote to memory of 3108 3308 121f406624b9995f3f19c5dcfeab6a66.exe 21 PID 3308 wrote to memory of 5072 3308 121f406624b9995f3f19c5dcfeab6a66.exe 20 PID 3308 wrote to memory of 5072 3308 121f406624b9995f3f19c5dcfeab6a66.exe 20 PID 3308 wrote to memory of 5072 3308 121f406624b9995f3f19c5dcfeab6a66.exe 20 PID 3108 wrote to memory of 4656 3108 ~DP4FE5.exe 42 PID 3108 wrote to memory of 4656 3108 ~DP4FE5.exe 42 PID 3108 wrote to memory of 4656 3108 ~DP4FE5.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\121f406624b9995f3f19c5dcfeab6a66.exe"C:\Users\Admin\AppData\Local\Temp\121f406624b9995f3f19c5dcfeab6a66.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\~DP50C1.exe"C:\Users\Admin\AppData\Local\Temp\~DP50C1.exe"2⤵
- Executes dropped EXE
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\~DP4FE5.exe"C:\Users\Admin\AppData\Local\Temp\~DP4FE5.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\winlogon.exeC:\Windows\winlogon.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4656
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f0 0x3fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD58619b4d2c237c044c7a5b24e00140411
SHA160ce620609c626bada9226fffc34a6cc276b5a39
SHA256ed90fa6fa86577d0d2c7b7d9e241e65f827bd0986f2a3ca0007a02d50c8593f6
SHA512cea0d0285fd6cc62f18587bc09db05cbd2a51c015d803dc360be5101bc41528fb22be5f1bb9769559041e9317a998c604475eac0b53d8a1dc948584a57228b17
-
Filesize
102KB
MD559fb30ba8347091eaeeb3fa215962cda
SHA1a74d2a2e9e6e89fd22c478b330f319991853f0eb
SHA256b0a8d7ee2f13965578ecc03bdd510e1ce1b0fa2a2aa64811b04a9efb1d866eb9
SHA51217fbebf65325bc1abc7c582e4640160ec63b03164bf8b24d00eef8cf9a9e4bf7c37c0d6bce3b99d62c0003f456fa8f338075dc0a532649b4e6197d4548ab25cb
-
Filesize
78KB
MD50741d7af5ea013ec4896f2fe72c13fb0
SHA1c9157d5bb45f9b3b45ddfff8d703c879d244965f
SHA256ed3dbdb224a4380ac24953103cee8b64c27acb8d0031e76eb4335185e0a637f8
SHA512b123d3e97789b8eb4189269ef7bb0c068e13165e44e2fe4fa45f158af52f9f72f5c37272847341c81d4d2bb5a11d80e92f3439d408569038f36da1d1bf758f29
-
Filesize
37KB
MD52603caec69a049b1ce63cf5ac4974112
SHA111d02dfc9cbfdc35d70c5d4bf43aa0c8a2a6dd52
SHA2567c51adf29f475cfe942c4380e8ef1e19bba6cde454c8a94a461943a4d11324ad
SHA51207ac64c5a015d6185f164fdf1f8e5adcd3cb58d12d2b2c33abe544041d1f4e627c8b9b3340cd095e3c35c0f0dd15b9dc56257e22b7a96407c3e1f4142261584b
-
Filesize
41KB
MD5e9bcc69aefb08897ee5cb81546253705
SHA18435b204b98fbe563654e65ab58a1e0447c87f1c
SHA256f1850e5c8eef81bd5080e303754f833b4a27498f6f0a9cdea730e16ed1ffcfa8
SHA5120e99c859b84ed100de4df3b0890e00cf8cd33a7b7624278faccf7c903c049b513b3495518c1ad6ec54e83be2dc6077cdf3c41637a0ceecf84762dd59d9b6cb4d
-
Filesize
156KB
MD5b524995de3a3a7fc987ce779cef59ff2
SHA16e6a0e733dd1fa27e98e0c077a8a0042e9bdf522
SHA25692d895fa1e0eac56231f89fabf80db4d666afbf2369ea42f5fba5d2dabd0b2c0
SHA512377dd960650514159f6e7f38007b5ed9da36e5f4bb970da64fed5bb82787877e094deeadb0fcfbbbf81be775f4a28b2078bab1e4efa35f5213598c11d32bb15e