Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
193s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
0d5cd0cb28a6da2bf6c2de5166ee9d76.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0d5cd0cb28a6da2bf6c2de5166ee9d76.exe
Resource
win10v2004-20231215-en
General
-
Target
0d5cd0cb28a6da2bf6c2de5166ee9d76.exe
-
Size
391KB
-
MD5
0d5cd0cb28a6da2bf6c2de5166ee9d76
-
SHA1
f7008a4c1ac1b27590ee56655c18f6f3f1fc1ff2
-
SHA256
8fcd842d46ad70bf72148e7a5d9d587566f91164279f32ae78670199e980a5e3
-
SHA512
2016e5f87aa76d5aa4dedb08b10d7f3b4522612871c692697a858392d3343cb4132b8fc2f38bf78871f2f48ff032502d0aa07eb059f3ea11459277bac4c8058e
-
SSDEEP
6144:lqq1+wa/QKgZ+K1J/4Thmd3Wc11KxEpBnXLz+k4O7Cp/LJz8Eb:YkkQKgD1uThmdmU1KxEpRLyw7et4Eb
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" MgKPyEORiQUvGj.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 552 MgKPyEORiQUvGj.exe -
resource yara_rule behavioral2/memory/2264-0-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/2264-2-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/552-7-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/2264-8-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/552-9-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/552-20-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/552-25-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/552-26-0x0000000000400000-0x000000000047A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MgKPyEORiQUvGj.exe = "C:\\ProgramData\\MgKPyEORiQUvGj.exe" 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini attrib.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MgKPyEORiQUvGj.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MgKPyEORiQUvGj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\7f6b3266-31c5-43a8-9547-e7911ad6fb33 MgKPyEORiQUvGj.exe Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\nsreg = "1703966395" MgKPyEORiQUvGj.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Download 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe 552 MgKPyEORiQUvGj.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 552 MgKPyEORiQUvGj.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 552 MgKPyEORiQUvGj.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2264 wrote to memory of 552 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 94 PID 2264 wrote to memory of 552 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 94 PID 2264 wrote to memory of 552 2264 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe 94 PID 552 wrote to memory of 848 552 MgKPyEORiQUvGj.exe 114 PID 552 wrote to memory of 848 552 MgKPyEORiQUvGj.exe 114 PID 552 wrote to memory of 848 552 MgKPyEORiQUvGj.exe 114 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 0d5cd0cb28a6da2bf6c2de5166ee9d76.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 848 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d5cd0cb28a6da2bf6c2de5166ee9d76.exe"C:\Users\Admin\AppData\Local\Temp\0d5cd0cb28a6da2bf6c2de5166ee9d76.exe"1⤵
- Adds Run key to start application
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2264 -
C:\ProgramData\MgKPyEORiQUvGj.exeC:\ProgramData\MgKPyEORiQUvGj.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\*.*" /s /d3⤵
- Drops desktop.ini file(s)
- Views/modifies file attributes
PID:848
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD50d5cd0cb28a6da2bf6c2de5166ee9d76
SHA1f7008a4c1ac1b27590ee56655c18f6f3f1fc1ff2
SHA2568fcd842d46ad70bf72148e7a5d9d587566f91164279f32ae78670199e980a5e3
SHA5122016e5f87aa76d5aa4dedb08b10d7f3b4522612871c692697a858392d3343cb4132b8fc2f38bf78871f2f48ff032502d0aa07eb059f3ea11459277bac4c8058e