Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:23
Behavioral task
behavioral1
Sample
00595b92c767712ef810c43f6f2c5fc9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00595b92c767712ef810c43f6f2c5fc9.exe
Resource
win10v2004-20231215-en
General
-
Target
00595b92c767712ef810c43f6f2c5fc9.exe
-
Size
26KB
-
MD5
00595b92c767712ef810c43f6f2c5fc9
-
SHA1
2f04f3cc34ff538b9546d8a4f980c0512913e207
-
SHA256
b937e5f7549b3e8636cb2e1cfd4fd3951cd659e1b402b9f11dc4f546a48be7ac
-
SHA512
387fbd2714bb45d87d1e355d44ad236b8f6c3551b66e31c53e98b432bf06971272a0016d1167fe94dc121191fa78a61f719cb897514d9e0d334656c80fa9d1a7
-
SSDEEP
384:9Vv7z9MWRO6xsTBuqi3nRuaiY/qSgOZH/Cv7XWdVXEywHRH9nXXK+FJtR:9lHWweo9RLTiLOZH/gXWd2fxH9nK+Ft
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000600000002321e-9.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 00595b92c767712ef810c43f6f2c5fc9.exe -
Loads dropped DLL 1 IoCs
pid Process 1440 00595b92c767712ef810c43f6f2c5fc9.exe -
resource yara_rule behavioral2/memory/1440-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000600000002321e-9.dat upx behavioral2/memory/1440-10-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral2/memory/1440-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1440-12-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\b1a18a3e.drv 00595b92c767712ef810c43f6f2c5fc9.exe File opened for modification C:\Windows\SysWOW64\4FBFD5A4.cfg 00595b92c767712ef810c43f6f2c5fc9.exe File opened for modification C:\Windows\SysWOW64\4FBFD5A4.dll 00595b92c767712ef810c43f6f2c5fc9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLsID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96}\InprocServer32 00595b92c767712ef810c43f6f2c5fc9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 00595b92c767712ef810c43f6f2c5fc9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLsID 00595b92c767712ef810c43f6f2c5fc9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96} 00595b92c767712ef810c43f6f2c5fc9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96}\InprocServer32 00595b92c767712ef810c43f6f2c5fc9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96}\InprocServer32\ = "4FBFD5A4.dll" 00595b92c767712ef810c43f6f2c5fc9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96}\InprocServer32\ThreadingModel = "Apartment" 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1440 00595b92c767712ef810c43f6f2c5fc9.exe 1440 00595b92c767712ef810c43f6f2c5fc9.exe 1440 00595b92c767712ef810c43f6f2c5fc9.exe 1440 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 1440 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1440 00595b92c767712ef810c43f6f2c5fc9.exe 1440 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1440 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1440 wrote to memory of 3000 1440 00595b92c767712ef810c43f6f2c5fc9.exe 92 PID 1440 wrote to memory of 3000 1440 00595b92c767712ef810c43f6f2c5fc9.exe 92 PID 1440 wrote to memory of 3000 1440 00595b92c767712ef810c43f6f2c5fc9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\00595b92c767712ef810c43f6f2c5fc9.exe"C:\Users\Admin\AppData\Local\Temp\00595b92c767712ef810c43f6f2c5fc9.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\00595B~1.EXE >> NUL2⤵PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5d1e778c1ab88c71d59cd030ca77d0706
SHA157615a317178661ea1ae786197186b652f4cb3b0
SHA25628cbfa031560a806587e52502d8d2042de681765143c020bf8bc814cd8618540
SHA512eb4a70bd5d3ee2210f1c0318d194ede80503a124bf8a8a0581bcc2fc7408d1b75af2d6e1fdc31d70bfafc4c3c184687cb684882d7187f0c8a4eddda58915ffbf