Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
161s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:02
Behavioral task
behavioral1
Sample
0516058b28cc9c085d9773d5624528b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0516058b28cc9c085d9773d5624528b2.exe
Resource
win10v2004-20231215-en
General
-
Target
0516058b28cc9c085d9773d5624528b2.exe
-
Size
196KB
-
MD5
0516058b28cc9c085d9773d5624528b2
-
SHA1
86bd22344c9fed8271096c760aee5948f4b1b0ca
-
SHA256
265a0390673cd148f175c9b4eea492f83463524535615fd3a5ef0e76ad8f3381
-
SHA512
ca4a75ebe4bda03ba15414c2723982161ec76f4ab1ff164a12616aef762a2ee846d83fa517e8b1eb58c3bb2f8c03b43931af5eac0409420af8058c94c5b2fe03
-
SSDEEP
3072:XfZTJiY9HMUVcTKwx0eCMKWeAbWgipBLHBPS6vFKyOOdPjhd5wAWCB0Ito6JjQN:vZwKwx0edReHFSyxtd7ho/ScN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "1" 0516058b28cc9c085d9773d5624528b2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\QQ = "D:\\Program\\3609\\QQ.exe" regedit.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\QQ = "D:\\Program\\3609\\QQ.exe" regedit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msscp.reg 0516058b28cc9c085d9773d5624528b2.exe File opened for modification C:\Windows\SysWOW64\msscp.reg 0516058b28cc9c085d9773d5624528b2.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\taobao.ico 0516058b28cc9c085d9773d5624528b2.exe File opened for modification C:\Program Files\Common Files\System\taobao.ico 0516058b28cc9c085d9773d5624528b2.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\web\Index.htm 0516058b28cc9c085d9773d5624528b2.exe File opened for modification C:\Windows\web\Index.htm 0516058b28cc9c085d9773d5624528b2.exe File created C:\Windows\web\Index.html 0516058b28cc9c085d9773d5624528b2.exe File opened for modification C:\Windows\web\Index.html 0516058b28cc9c085d9773d5624528b2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\TYPEDURLS 0516058b28cc9c085d9773d5624528b2.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://6l.cn/s/" 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://6l.cn/s/" 0516058b28cc9c085d9773d5624528b2.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\10 = "1" 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D)\Command\ = "Rundll32.exe" 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\Command 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\ = "´ò¿ªÖ÷Ò³(&H)" 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8} 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D)\Command 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\HideOnDesktopPerUser 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ = "Internet Explorer" 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\DefaultIcon 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R) 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\HideFolderVerbs 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M)\Command 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\WantsParseDisplayName 0516058b28cc9c085d9773d5624528b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\10 = "0" 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ɾ³ý(&D) 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M) 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÊôÐÔ(&R)\Command 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell 0516058b28cc9c085d9773d5624528b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\1 = "20231230" 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE" 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\ÖØÃüÃû(&M)\Command\ = "Rundll32.exe" 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O) 0516058b28cc9c085d9773d5624528b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\ShellFolder\Attributes = "0" 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a 0516058b28cc9c085d9773d5624528b2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\cdafile2 = "301007" 0516058b28cc9c085d9773d5624528b2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0516058b28cc9c085d9773d5624528b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C1A8AF25-1257-101B-8FB0-0020AF039CA8}\Shell\Open(&O)\Command\ = "iexplore.exe C:\\WINDOWS\\Web\\index.html" 0516058b28cc9c085d9773d5624528b2.exe -
Runs .reg file with regedit 2 IoCs
pid Process 4388 regedit.exe 1512 regedit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4388 4104 0516058b28cc9c085d9773d5624528b2.exe 91 PID 4104 wrote to memory of 4388 4104 0516058b28cc9c085d9773d5624528b2.exe 91 PID 4104 wrote to memory of 4388 4104 0516058b28cc9c085d9773d5624528b2.exe 91 PID 4104 wrote to memory of 4100 4104 0516058b28cc9c085d9773d5624528b2.exe 92 PID 4104 wrote to memory of 4100 4104 0516058b28cc9c085d9773d5624528b2.exe 92 PID 4104 wrote to memory of 4100 4104 0516058b28cc9c085d9773d5624528b2.exe 92 PID 4100 wrote to memory of 1512 4100 0516058b28cc9c085d9773d5624528b2.exe 93 PID 4100 wrote to memory of 1512 4100 0516058b28cc9c085d9773d5624528b2.exe 93 PID 4100 wrote to memory of 1512 4100 0516058b28cc9c085d9773d5624528b2.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0516058b28cc9c085d9773d5624528b2.exe"C:\Users\Admin\AppData\Local\Temp\0516058b28cc9c085d9773d5624528b2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\0516058b28cc9c085d9773d5624528b2.exeC:\Users\Admin\AppData\Local\Temp\0516058b28cc9c085d9773d5624528b2.exe2⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg3⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:1512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5468fada123f5548ac87e57bae81f6782
SHA1edb8f012c25906e6afd8bf335b495e16c440243d
SHA256091c882bb307d57f2c7c42309e7ba8740130fef8c3ed772b0bc5e5505e37034d
SHA512635ec26c88c2394dd4f2a81b9aea8f429a91adfeb37ae34e51b03f3cf8e503c123c3685938f40cea07d6146e0c7113aadbe62fa528f1f6d8b995e617fd68a4aa
-
Filesize
143B
MD5ba8a11d92f6681848900296195711622
SHA1897e7d841d07994edfd223ace4dfc846e0933ad7
SHA2564e92540ddc73fdfad957836a26c11a2252d6e1b175be2af0809df6b1452150f5
SHA512a4ea25d765624801436fb5a8b44f3b991668b8593267d388d2d499f356b1ad31f2470c2ebb99349c463ab03a296703f09c0618d4f50980c3ca0e1d718e08917a