Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 14:42
Behavioral task
behavioral1
Sample
766ee6dc582d9b2d41a71682c0c1110b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
766ee6dc582d9b2d41a71682c0c1110b.exe
Resource
win10v2004-20231222-en
General
-
Target
766ee6dc582d9b2d41a71682c0c1110b.exe
-
Size
260KB
-
MD5
766ee6dc582d9b2d41a71682c0c1110b
-
SHA1
e0bbf07fffe3c335379b2e2c4b8c775bd9862216
-
SHA256
774cce6d84e36ac0686ecddd48aea659b701d44d24ed0b1d9e5eb1d900832d2d
-
SHA512
117ee59dada19fb95d097103d315658b71246f2399f0c5ec5e3708363e8976af9f26349fd2400710f85f7e1bf418e452e78ae4d479f1e2c68491122e4e61e334
-
SSDEEP
6144:D7JyLfvkJAuZ9xqtc6sgjpCr1qT612UEqYcj9ZsaBSEV:D7wfvcAu5qJKETqnY+bs47V
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\porting\Parameters\ServiceDll = "C:\\Windows\\system32\\e573b82.dll" 766ee6dc582d9b2d41a71682c0c1110b.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 766ee6dc582d9b2d41a71682c0c1110b.exe -
Loads dropped DLL 3 IoCs
pid Process 3596 766ee6dc582d9b2d41a71682c0c1110b.exe 4956 svchost.exe 2372 rundll32.exe -
resource yara_rule behavioral2/memory/3596-9-0x0000000000AE0000-0x0000000000B8B000-memory.dmp upx behavioral2/memory/3596-0-0x0000000000AE0000-0x0000000000B8B000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\e573b82.dll 766ee6dc582d9b2d41a71682c0c1110b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3596 766ee6dc582d9b2d41a71682c0c1110b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4956 wrote to memory of 2372 4956 svchost.exe 18 PID 4956 wrote to memory of 2372 4956 svchost.exe 18 PID 4956 wrote to memory of 2372 4956 svchost.exe 18 PID 3596 wrote to memory of 3536 3596 766ee6dc582d9b2d41a71682c0c1110b.exe 21 PID 3596 wrote to memory of 3536 3596 766ee6dc582d9b2d41a71682c0c1110b.exe 21 PID 3596 wrote to memory of 3536 3596 766ee6dc582d9b2d41a71682c0c1110b.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\766ee6dc582d9b2d41a71682c0c1110b.exe"C:\Users\Admin\AppData\Local\Temp\766ee6dc582d9b2d41a71682c0c1110b.exe"1⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\766EE6~1.EXE" > nul2⤵PID:3536
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\e573b82.dll, Launch1⤵
- Loads dropped DLL
PID:2372
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "porting"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD50c97c80bbc40fb49ea10ed3559769114
SHA1346d96ebac84ff415c917870304d22e3d67bfe17
SHA2566ebf73782516404e43ac566cdac271a232c2e4c618726bea0f67bc4b9e378ff1
SHA5124a508185a6581d0511c14fdaa615dd172dd8e7d2d778d72e3b65d9fa839d360cb6d23d39fa744c8c7d0daf5d31c49653539a20db801d9a651204d4a6a8241db6
-
Filesize
33KB
MD5564fd6a9d402344ef7471562ffd85ac1
SHA19943ab194bef43462079c64efb422935a035d0d2
SHA256b06806a82360ba94ee11b5f3b55911640d9ea7847c7e5c588fec49e9c247a050
SHA5121e68734c1c1dbb05680ee9c1df7dd0600354592a1f8ffacef9d5f38beaa5356d0bfbd79f01c00bb24416d0c12d6c9e046f2a9168cfe041d31626e5ac7fbfcac6
-
Filesize
47KB
MD5b85ceab9b66087af489c605cde59c588
SHA1efd3c37ca4dbd3c0e8aa7a71683fad1274e94fe3
SHA256d6b25a7733a90a718e7331fb6c5354765586dc9b5f950d0e38f69b19005d0d7a
SHA5124ef7bc17ab576dbec22b79a6b42338daa44103f25b900dc972d99199467448aaf4c0c50436122224ec8117be2279fb861cd39689b9770fa9b0115f42ee39e085
-
Filesize
124KB
MD5c612b4a4914978657dd3c9662aa6b297
SHA135e422f90ca6d6d6e908ba49b4d47f10a7e50eee
SHA256d8fb05b5ffdf9c1439bb6f098b0eadd254e2cafc9abc1b6ba13888dd00dcca13
SHA51280f9320331e5e9b0d732139e8ff293e89035e702d0c582de619fb908e8b012dc25b2a723a5d8e5d7d275f81350d2e023b938074a7ae6adab3e9a7f1b555252f8