Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
067df5ba5851ae83dccd875f285079fb.exe
Resource
win7-20231215-en
General
-
Target
067df5ba5851ae83dccd875f285079fb.exe
-
Size
173KB
-
MD5
067df5ba5851ae83dccd875f285079fb
-
SHA1
6975704c21e36c0a0492cde1c62a938146cc6b2b
-
SHA256
46e31923b64a8036d6916e12b0fab118feb3a93eb05c78855f6443810632a057
-
SHA512
00efa2435b9340ce1c8c968382f58276071f8491ee12cf129df2e778df7bfd37fda7982b8af761976421a0e32b55518080217db7ec8dfcd15e4eb1b261f3066b
-
SSDEEP
3072:1pzRNYuluupWyvbOijh7UAoaI52pySvl3nW0CWcscGF8ZHmt4qsUS9:1ZRvupm9UX5WflXW5Wc88wGVUS9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2336-1-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/2336-25-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/2336-5-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/2336-4-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/2336-3-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/2336-45-0x0000000010000000-0x000000001004C000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 067df5ba5851ae83dccd875f285079fb.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\nsinet.exe 067df5ba5851ae83dccd875f285079fb.exe File opened for modification C:\Windows\SysWOW64\nsinet.exe 067df5ba5851ae83dccd875f285079fb.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Instant Access\Center\NoCreditCard.lnk 067df5ba5851ae83dccd875f285079fb.exe File opened for modification C:\Program Files (x86)\Instant Access\Center\NoCreditCard.lnk 067df5ba5851ae83dccd875f285079fb.exe File created C:\Program Files (x86)\Instant Access\Multi\20100112050105\Common\module.php 067df5ba5851ae83dccd875f285079fb.exe File created C:\Program Files (x86)\Instant Access\Multi\20100112050105\medias\dialer.ico 067df5ba5851ae83dccd875f285079fb.exe File created C:\Program Files (x86)\Instant Access\Multi\20100112050105\js\js_api_dialer.php 067df5ba5851ae83dccd875f285079fb.exe File created C:\Program Files (x86)\Instant Access\Multi\20100112050105\dialerexe.ini 067df5ba5851ae83dccd875f285079fb.exe File created C:\Program Files (x86)\Instant Access\Multi\20100112050105\instant access.exe 067df5ba5851ae83dccd875f285079fb.exe File created C:\Program Files (x86)\Instant Access\DesktopIcons\NoCreditCard.lnk 067df5ba5851ae83dccd875f285079fb.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\dialexe.epk 067df5ba5851ae83dccd875f285079fb.exe File created C:\Windows\dialerexe.ini 067df5ba5851ae83dccd875f285079fb.exe File created C:\Windows\dialexe.zl 067df5ba5851ae83dccd875f285079fb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF1C8E21-4045-4D67-B528-335F1A4F0DE9} 067df5ba5851ae83dccd875f285079fb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF1C8E21-4045-4D67-B528-335F1A4F0DE9}\LocalServer32 067df5ba5851ae83dccd875f285079fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF1C8E21-4045-4D67-B528-335F1A4F0DE9}\LocalServer32\ = "C:\\Windows\\SysWow64\\nsinet.exe /run" 067df5ba5851ae83dccd875f285079fb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2336 067df5ba5851ae83dccd875f285079fb.exe 2336 067df5ba5851ae83dccd875f285079fb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\067df5ba5851ae83dccd875f285079fb.exe"C:\Users\Admin\AppData\Local\Temp\067df5ba5851ae83dccd875f285079fb.exe"1⤵
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2336
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5dcb723721961fcbdc756665dd0443894
SHA1c1dde1010ee4be58a54e5a9e55cae05db96cafe5
SHA256f3200179e5c066f27bc4cd68d598b79e83a6ef974ed670137dcee84c7d7aa31c
SHA51290719937f5e027f166373fba84f67a096f9fd43223eecf09d92bafa69e004ba5a78ca9b4c30e18efb85d33d8d3dfcc2a574447c4f49a960aae8b3bee1de71b0b