Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
1e71ff872199864b856503a8972d658d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e71ff872199864b856503a8972d658d.exe
Resource
win10v2004-20231215-en
General
-
Target
1e71ff872199864b856503a8972d658d.exe
-
Size
3.6MB
-
MD5
1e71ff872199864b856503a8972d658d
-
SHA1
424929f8685948678b8a7ec501081fbd7a37277b
-
SHA256
12c1a04a01b2a50126523be7f39bea8afbd17786104e1111628ffb953f2dee2c
-
SHA512
00f6a588adef8a86697d5e1c1b22101d7aee983c70462ffb28c5887d9a5f8f76a6ad660d81149b09649be482a7d1601578d64869dbc0cf0fd2c44d420b362382
-
SSDEEP
98304:1u7AEvgVOhaHaEtPW/w2mCzdccnaZjwEktE:QAEvgVOhoD66c0w3tE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 1e71ff872199864b856503a8972d658d.tmp -
Executes dropped EXE 2 IoCs
pid Process 4104 1e71ff872199864b856503a8972d658d.tmp 2440 setup.exe -
Loads dropped DLL 17 IoCs
pid Process 4104 1e71ff872199864b856503a8972d658d.tmp 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe 2440 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings setup.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2440 setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 setup.exe 2440 setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3272 wrote to memory of 4104 3272 1e71ff872199864b856503a8972d658d.exe 89 PID 3272 wrote to memory of 4104 3272 1e71ff872199864b856503a8972d658d.exe 89 PID 3272 wrote to memory of 4104 3272 1e71ff872199864b856503a8972d658d.exe 89 PID 4104 wrote to memory of 2440 4104 1e71ff872199864b856503a8972d658d.tmp 94 PID 4104 wrote to memory of 2440 4104 1e71ff872199864b856503a8972d658d.tmp 94 PID 4104 wrote to memory of 2440 4104 1e71ff872199864b856503a8972d658d.tmp 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe"C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\is-EKUOL.tmp\1e71ff872199864b856503a8972d658d.tmp"C:\Users\Admin\AppData\Local\Temp\is-EKUOL.tmp\1e71ff872199864b856503a8972d658d.tmp" /SL5="$60066,3509953,66560,C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\tmp2023104040\setup.exe"C:\Users\Admin\AppData\Local\Temp\tmp2023104040\setup.exe" /path="C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe" /pn=mf3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
96KB
MD5a8ead75e9ce7ffde0c93b02c78482c71
SHA13a1c3af254d889795e4408cc06d01ccdc93be259
SHA256226e17ede7185fa615d3282b7e84ccbf7d420ce39be97094f386d61a629d545b
SHA5127ba7bb2b4640cd41f7abb8179e420886760f7d75bb56e05341212c71039af88c9fc8b347382f18c5b17067e7571d3666e76f7e57d86f52fc8081be56faecf2ca
-
Filesize
701KB
MD55d66e66c72bb42c3f33d3ac15acf1445
SHA1011ab6d35c38f292f65d3904a81a405fe33e7868
SHA256928c908d46e033a2e973d536f4aec718edcd7f214376010cd28567d05174cf98
SHA5123061de25914b17908f2d6d3a85c30f0b3d75a06d866c528c273132b84933b0ee180b13ae95472e80bff9487c875763fe08351ccb30535d00935eb04b0f3b1e10
-
Filesize
382KB
MD593ff732878418da194278b60d7a59e8a
SHA1cd8c47f1c678ace49da2398433679d9df3095e62
SHA25644e0ea7188380d7178d62d37e61ebdf4c771cd4231edfe08aa5491bfca0c5650
SHA512dd7a1c384324fa35d848daaa5c2e3b7b7bc7dc4e25f84f3dc96751412b8e92553f0845030c0cef7d54e91efa92b68c939efee9243975a80b397e9569eb92ab59
-
Filesize
1.6MB
MD56fb9303fab9235f6beaab431d05848cf
SHA1a870518742efc0d12733adb6b913753e84987b93
SHA256899753e746603830bfd746915c77ef8113dcc41dadb9ed0bc859b0aaaa24e7cd
SHA512af822f5eed924b842db6ba53ac9360ef6bebccc2499b92c18fc7fd63e2c22f5c009c833bb5e4ee6c72e0113b75012ee650455597f9425c90c071c2e556123705
-
Filesize
92KB
MD500ca6bc288884c685015c816a83bba15
SHA181c661032779d41cd9c38f2d4b84d2ba577cd0b7
SHA256d16dd0894d746db75d1cad807caa5a66002228db30969dd509b7ff5e3dbfc095
SHA512b7428c03952f9b0d9e97603f3bacb6e676a33d2bd742861e219ce71b081bba87c1446486f293afc7036089e11e011f58d1ca048bb79af141cebe85bd4dafa2ac
-
Filesize
381KB
MD53490c43185c7c55ff9cff4aa4f9afc8d
SHA1b5e93459cc5714ffa3d0ea1811872aac2f32c886
SHA25600b9a3c77d683c551433f9792fef79949c16217bd35ab7862b42380eb49cc518
SHA512894616f0910f853a8f07ee9eec3d1f895faa8560233495b374ef4b9e916c480205149956d0bab7b0c450e173484d4332862bce1c466c89839b4e7760edcdb920