Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
16bdae8ef0df9f8a7d00c2894f1eb4c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16bdae8ef0df9f8a7d00c2894f1eb4c1.exe
Resource
win10v2004-20231215-en
General
-
Target
16bdae8ef0df9f8a7d00c2894f1eb4c1.exe
-
Size
2.0MB
-
MD5
16bdae8ef0df9f8a7d00c2894f1eb4c1
-
SHA1
e1526c10cebb997cd774b76f5fac8ff85c2f7659
-
SHA256
41d1925957031e9caee9014b69e59007354719a35bdad1f01e05231977d1ba2b
-
SHA512
05341efbdcfd05bb040c188f917c784697e452cc5d36854da04e86494cd8a3480a8fce0f33312e7a3ce1d61dd9797ce0f64ae7e1f9d7f234000744345f5c51c6
-
SSDEEP
49152:OFUcx88PWPOpX0SFlSqbBVcS4pnUi4mu0M8bDwlZQnzei60rNVyGc:O+K88uPCHbSqb0JUmA8bDe+C4yGc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 4C7A.tmp -
Executes dropped EXE 1 IoCs
pid Process 1520 4C7A.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings 4C7A.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3452 WINWORD.EXE 3452 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1520 4C7A.tmp -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3452 WINWORD.EXE 3452 WINWORD.EXE 3452 WINWORD.EXE 3452 WINWORD.EXE 3452 WINWORD.EXE 3452 WINWORD.EXE 3452 WINWORD.EXE 3452 WINWORD.EXE 3452 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4980 wrote to memory of 1520 4980 16bdae8ef0df9f8a7d00c2894f1eb4c1.exe 44 PID 4980 wrote to memory of 1520 4980 16bdae8ef0df9f8a7d00c2894f1eb4c1.exe 44 PID 4980 wrote to memory of 1520 4980 16bdae8ef0df9f8a7d00c2894f1eb4c1.exe 44 PID 1520 wrote to memory of 3452 1520 4C7A.tmp 94 PID 1520 wrote to memory of 3452 1520 4C7A.tmp 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\16bdae8ef0df9f8a7d00c2894f1eb4c1.exe"C:\Users\Admin\AppData\Local\Temp\16bdae8ef0df9f8a7d00c2894f1eb4c1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\4C7A.tmp"C:\Users\Admin\AppData\Local\Temp\4C7A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\16bdae8ef0df9f8a7d00c2894f1eb4c1.exe FB227B165102050FC8685CE45125A196804DC8A7D148B258C17D942245897CA5AD6022546663AEAC92AE4DF31B8BEAD2680A669941DA0E864B96C4EB2217C0312⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\16bdae8ef0df9f8a7d00c2894f1eb4c1.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD54046ff080673cffac6529512b8d3bdbb
SHA1d3cbc39065b7a55e995fa25397da2140bdac80c1
SHA256f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680
SHA512453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418
-
Filesize
832KB
MD5f1f246f47f21accb9a3ee707a68597cb
SHA17742fc2a0fd461764cd713c969e395c195240b61
SHA2568d7691d4d4bd333c3bc22bd85def2530477b5d5e7e848f81711a196aa796174a
SHA512785d58cb636ab079cec6fa34f33ebeb4307a58416288cac0f847405bda4379367f4ef2e96e844ac7fca044fda18580b40003b0fed8e5a88b6576062a7e2923b7
-
Filesize
365KB
MD52a911156a40b1404ba07e1935ca4307c
SHA1d5dd8a18e4d22577e63b275d0082764b7b658e0c
SHA2568cf14c5555412ca879eba5e3573990d70180b0375e354ade9365ca71f878e992
SHA512be1b6b057a58df97daeb81b28adf42435a0257c801c26446120848fd3f21c2e6876c74a9df8b8e4d91dcd08731118ad3c942925dba8ea0bafea882d374eb26b2