Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:38
Behavioral task
behavioral1
Sample
2263d9661087c367cb757a58c0c505df.exe
Resource
win7-20231129-en
General
-
Target
2263d9661087c367cb757a58c0c505df.exe
-
Size
211KB
-
MD5
2263d9661087c367cb757a58c0c505df
-
SHA1
1ef5c1b3c3f95bd79657ebc0d6b9a3d602c7604b
-
SHA256
30ec8a71f9c5e303be353c877db015b733173281d81f7278b933bc5b4c956d73
-
SHA512
aa6c1abb9a7abed003b97cc90c8feadd706a5bde58a573d51af7deff07e8c6acd0b6be940f4d6306aafc7d808fe505447c5f896981fa990164a171b5d6d9a94e
-
SSDEEP
1536:M6qxQui3mTjqsuc9TGl0hwpWbdCwprWhVHh+Nk:0PzARp0dCwS+Nk
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List dwm.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile dwm.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications dwm.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 2263d9661087c367cb757a58c0c505df.exe -
Executes dropped EXE 2 IoCs
pid Process 1732 dwm.exe 2992 dwm.exe -
resource yara_rule behavioral2/memory/4488-0-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/files/0x00070000000231f4-5.dat upx behavioral2/memory/1732-13-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/1732-10-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/4488-9-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/2992-14-0x0000000000400000-0x0000000000432000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\dwm.exe 2263d9661087c367cb757a58c0c505df.exe File opened for modification C:\Windows\system\dwm.exe 2263d9661087c367cb757a58c0c505df.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 316 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" dwm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4488 2263d9661087c367cb757a58c0c505df.exe 4488 2263d9661087c367cb757a58c0c505df.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4488 wrote to memory of 316 4488 2263d9661087c367cb757a58c0c505df.exe 20 PID 4488 wrote to memory of 316 4488 2263d9661087c367cb757a58c0c505df.exe 20 PID 4488 wrote to memory of 316 4488 2263d9661087c367cb757a58c0c505df.exe 20 PID 4488 wrote to memory of 1732 4488 2263d9661087c367cb757a58c0c505df.exe 46 PID 4488 wrote to memory of 1732 4488 2263d9661087c367cb757a58c0c505df.exe 46 PID 4488 wrote to memory of 1732 4488 2263d9661087c367cb757a58c0c505df.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\2263d9661087c367cb757a58c0c505df.exe"C:\Users\Admin\AppData\Local\Temp\2263d9661087c367cb757a58c0c505df.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\sc.exesc delete darkness2⤵
- Launches sc.exe
PID:316
-
-
C:\Windows\system\dwm.exe"C:\Windows\system\dwm.exe" /start2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Windows\system\dwm.exeC:\Windows\system\dwm.exe1⤵
- Modifies firewall policy service
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD57ac856cb52a6371db2e52971943fba53
SHA18a9734db64a517794ce8c6fa778e41199b16cdb7
SHA256d06d611a3dc1d3998fc485652e2ad86813d6154f4b84d18b6602fcad3699c9ec
SHA512a20a0ec285b93c9eac5774e841f6c17f8908e4fe543dff6a38bb18d7e391b3c3f09ddded2af65400bbcbc96acb1b30ea01a2b6aa53af95a8c0f3de81d00fb112