Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 07:36

General

  • Target

    Video.scr

  • Size

    501KB

  • MD5

    95e262649c92fe0ed751212d5ab5ceb4

  • SHA1

    47335a184e4ea778f4bd5fefdb84862f53377486

  • SHA256

    b401cbb362310927a6c965b0c08572cbe1d306a45f2c4fc0d180950b997c0f45

  • SHA512

    b19dfee8dee74636e7887bc8a4e82795040c0508ba41c8fd591ff5ae9933cb4a69c83e4d738a47a771b07d018aee2ed9e8d54f94b5ed05ea4d0fe584f8f1c9dd

  • SSDEEP

    6144:mKrxiyLvmWVXGlvqSKMXoztsPaB/9O+xBh0OXjNKU7+X0X+Yhs3hKjV0Muq+p/Oc:3tLXhnWoJsPa/FbTgU7HX+YZVDvZ9Y

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Video.scr
    "C:\Users\Admin\AppData\Local\Temp\Video.scr" /S
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Adobe Systems,inc\Adobe Flash Video\msg.vbs"
      2⤵
        PID:4268
      • C:\Program Files (x86)\Adobe Systems,inc\Adobe Flash Video\svchost.exe
        "C:\Program Files (x86)\Adobe Systems,inc\Adobe Flash Video\svchost.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 444
          3⤵
          • Program crash
          PID:1320
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c uuu.bat
          3⤵
            PID:2248
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Adobe Systems,inc\Adobe Flash Video\stata.bat" "
          2⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:3808
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" "http://moops.sooot.cn/"
            3⤵
            • Modifies Internet Explorer settings
            PID:732
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:732 CREDAT:17410 /prefetch:2
              4⤵
                PID:2524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2204 -ip 2204
          1⤵
            PID:4556

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Adobe Systems,inc\Adobe Flash Video\msg.vbs

            Filesize

            93B

            MD5

            b34b57288f11f444c45c6b01a5686f5b

            SHA1

            adf5cd49bba9f026170ba97f2583b4e33cc37eb3

            SHA256

            0e00483a4a7e1c83ad577e08a4207ea62ec51c7e817d921256855d857dda6262

            SHA512

            4aae8d2eeae05d501f98adecbcc54415838b48db405f8bae0afdc156ab633865724a37d9bd0dd08783e7a323b779f4af0702d1d499c593264b8b0cc1b92dc4b7

          • C:\Program Files (x86)\Adobe Systems,inc\Adobe Flash Video\stata.bat

            Filesize

            54B

            MD5

            37f62c226aeaa2be7cdfe7cd079db9fe

            SHA1

            5c9479864576b9617a0997fe745b4cf846279073

            SHA256

            b2ad75022d0f6a008df39fc6e5edf3550f6df011a5ff4a0100652a3fa3048179

            SHA512

            fde4d2a763a43403469713df775d1b6e332543d546973ac81158061b3971c1317a9ebbd7b0c7a2564f9297981ffb12f36b61f81f7a83b0c62751c80e458d2fbe

          • C:\Program Files (x86)\Adobe Systems,inc\Adobe Flash Video\svchost.exe

            Filesize

            363KB

            MD5

            51110e395ff4bd02ba1964e0aac40ede

            SHA1

            5f6071853af3d92b90ba514f66272b2b40c6903c

            SHA256

            d941bbe06aa47be79909ec6b94d6ba68358c5cdfb542cb3de3acfe8895f889ab

            SHA512

            9de12e8feab39a41c2098526e24318b9ecbb972c4bb08e1ac82ee13e107dad8d91d876ad252a290d26e50ddc80bb1479cf62b8a5b425f7098ddcd36b6a7b6dce

          • C:\Program Files (x86)\Adobe Systems,inc\Adobe Flash Video\svchost.exe

            Filesize

            69KB

            MD5

            b6464769e6a6e5921ce14a3aa8e18995

            SHA1

            74afa91347dc0f1eefd967235376859df6487343

            SHA256

            8b8ce9e23e9fd5eaca187bfb2d17e701bdd840f8d131dc30d069120a7a464300

            SHA512

            508cfb0f2bafcbc85eb4a9e514e0c6e87623ee785c19c842f85849af1d1afe590eac4394edc9657db51d0753f86b1256cb4e2a91802e25fcaed6ee179c74ad7f

          • C:\Program Files (x86)\Adobe Systems,inc\Adobe Flash Video\uuu.bat

            Filesize

            17B

            MD5

            bf55292f19b02c6dd1934f2ea2c6ae9d

            SHA1

            0dc0e99b63b557bd0eef88422a98bdd944bc0d86

            SHA256

            0a233cde4c8f447e9de44205506e62fee592a625f9c4e1ee1394a5de9712902e

            SHA512

            e570ce99327527cd3d63256eac3763ba88e33ff4110bbcbeddce0860e88b45afb8180ef82a01669a6e5205a28353a9fce95a1cd9906da10670f9a7c9d947c500

          • memory/2204-43-0x0000000002420000-0x0000000002497000-memory.dmp

            Filesize

            476KB

          • memory/2204-48-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-33-0x00000000023A0000-0x00000000023F5000-memory.dmp

            Filesize

            340KB

          • memory/2204-34-0x00000000023A0000-0x00000000023F5000-memory.dmp

            Filesize

            340KB

          • memory/2204-35-0x00000000025E0000-0x00000000025E2000-memory.dmp

            Filesize

            8KB

          • memory/2204-36-0x0000000002760000-0x0000000002761000-memory.dmp

            Filesize

            4KB

          • memory/2204-28-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-38-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-40-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-41-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-42-0x00000000023A0000-0x00000000023F5000-memory.dmp

            Filesize

            340KB

          • memory/2204-31-0x0000000002420000-0x0000000002497000-memory.dmp

            Filesize

            476KB

          • memory/2204-44-0x0000000002760000-0x0000000002761000-memory.dmp

            Filesize

            4KB

          • memory/2204-32-0x00000000023A0000-0x00000000023F5000-memory.dmp

            Filesize

            340KB

          • memory/2204-50-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-52-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-54-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-58-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-60-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-62-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-64-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-66-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-156-0x00000000023A0000-0x00000000023F5000-memory.dmp

            Filesize

            340KB

          • memory/2204-157-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/2204-30-0x00000000023A0000-0x00000000023F5000-memory.dmp

            Filesize

            340KB

          • memory/2204-159-0x0000000002420000-0x0000000002497000-memory.dmp

            Filesize

            476KB

          • memory/4536-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4536-163-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB