Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
174s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
16190c451e52c9d33666f52c694d66e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16190c451e52c9d33666f52c694d66e7.exe
Resource
win10v2004-20231215-en
General
-
Target
16190c451e52c9d33666f52c694d66e7.exe
-
Size
78KB
-
MD5
16190c451e52c9d33666f52c694d66e7
-
SHA1
6dc41230a9ca05bb57ba41672125f7949a1d5c46
-
SHA256
7c77dfc4193baf07665f410ff1aa78658833300e172d2016c95e6b3765331344
-
SHA512
bdcc0e1a6f89260c3e28598a59f3da9d64422bd9f906417d0a870ed5fc47b91b4e2e61037a7f7428b6db20c1f3b243c04ba000cc8421b5e39b9a72a12d725ee0
-
SSDEEP
1536:fKiYAF65m3jCPcVo6r7S/rab7tnouy8uOWPcVo6r7S/rabHnouy8aO:fKzAU5uh7cWbZoutb7cWbHout
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 16190c451e52c9d33666f52c694d66e7.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation color.exe -
Executes dropped EXE 1 IoCs
pid Process 1172 color.exe -
resource yara_rule behavioral2/files/0x000200000001e7de-19.dat upx behavioral2/files/0x000200000001e7df-22.dat upx behavioral2/memory/1172-37-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1172-43-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe gamma load = "C:\\ProgramData\\adob\\color.exe" regedit.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1908 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 4328 regedit.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1020 PING.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2216 wrote to memory of 4188 2216 16190c451e52c9d33666f52c694d66e7.exe 95 PID 2216 wrote to memory of 4188 2216 16190c451e52c9d33666f52c694d66e7.exe 95 PID 2216 wrote to memory of 4188 2216 16190c451e52c9d33666f52c694d66e7.exe 95 PID 4188 wrote to memory of 4328 4188 cmd.exe 98 PID 4188 wrote to memory of 4328 4188 cmd.exe 98 PID 4188 wrote to memory of 4328 4188 cmd.exe 98 PID 4188 wrote to memory of 1256 4188 cmd.exe 99 PID 4188 wrote to memory of 1256 4188 cmd.exe 99 PID 4188 wrote to memory of 1256 4188 cmd.exe 99 PID 1256 wrote to memory of 3804 1256 net.exe 100 PID 1256 wrote to memory of 3804 1256 net.exe 100 PID 1256 wrote to memory of 3804 1256 net.exe 100 PID 4188 wrote to memory of 1908 4188 cmd.exe 101 PID 4188 wrote to memory of 1908 4188 cmd.exe 101 PID 4188 wrote to memory of 1908 4188 cmd.exe 101 PID 4188 wrote to memory of 1172 4188 cmd.exe 102 PID 4188 wrote to memory of 1172 4188 cmd.exe 102 PID 4188 wrote to memory of 1172 4188 cmd.exe 102 PID 1172 wrote to memory of 4408 1172 color.exe 103 PID 1172 wrote to memory of 4408 1172 color.exe 103 PID 1172 wrote to memory of 4408 1172 color.exe 103 PID 4408 wrote to memory of 1020 4408 cmd.exe 105 PID 4408 wrote to memory of 1020 4408 cmd.exe 105 PID 4408 wrote to memory of 1020 4408 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\16190c451e52c9d33666f52c694d66e7.exe"C:\Users\Admin\AppData\Local\Temp\16190c451e52c9d33666f52c694d66e7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BF63.tmp\1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s 123.reg3⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:4328
-
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:3804
-
-
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1908
-
-
C:\ProgramData\adob\color.exeC:\ProgramData\adob\color.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9282.tmp\123.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 1005⤵
- Runs ping.exe
PID:1020
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5ee8492b5b429e650b89048e92f4f9d68
SHA1ce4e2b661350d086c05b4d61cefb111676a7cdb5
SHA256df84b19075d92eccd37782734fd51d95f3b7c2a61380ccf5a701b902be6d95db
SHA512c6238f2f30e8d6d665be44aba4495cfe320858dd46d0d97ed7b6468c3ec7708d188422b71b85c849114bf266b0680e24724703d8bb52b9e749677ba0050c9a1f
-
Filesize
109B
MD55fd25964e9b6f81ff172e80d1c7b6af4
SHA1c2acded3847b8c8a4f373f48c7f0ea2f254c5080
SHA2568471d34b6bc8fbb6e386d2c0a86b7815d93efbd25928d952ecaf316456a55ed4
SHA51262fced5af86bc5c5766e3705226f1b79f1fde24c6506e0ba0531443c4691f511216430c25f4d71ba16323657b0111a0fbdcca4f298b82644f4d241676c08f845
-
Filesize
332B
MD5aaa5d717209daca5a9287d9d4f0cb454
SHA1657dcb0af1436eaf1180f6d46f1476db23d9c573
SHA2564ff88c295d89a746f96add13abc600f8c485ca5fce752bae377931b672b36023
SHA512216e6d4fdc4dc53c2d811ce661bcf8dbee534e529b274cec4150fe7f62a64649838b51fa0d153d06231de793a4e6a6bde0e75ef5ad97b8eb8b3066382804ea9e
-
Filesize
21KB
MD5648666c2b3c6781b54f904ffdab14de3
SHA13a5e257d1e17b46e6bf649b23359b2f317815620
SHA2566d742cca69f05e951c1e12d20007f58bb7a1e11e4981dd11a1948cc9edb98bb0
SHA512fbec2b3532cc2d8b4362697f8bee39d92b64ac768fe57b1395d336f2cde6509e31a4e9679dc1e8bc95fb2a9fa0de7b79e21f257f4577fa2ccdf6fc48d7d4196c
-
Filesize
21KB
MD5c1acc477923df9ebf4eab7484dcae003
SHA11b1575145dd37acb0540d75d50c34106f2e8a727
SHA256f69a4dfb347bf285d238e57d896ac7ae4974d105b1fb20aa5f40655022a0a888
SHA5121a58a41b00210517bedb68e4d6dd0bdf2f469ca30343a18c951a4b16d7db3b9951f60d52b4475899f0b8772a7b6e4d1c5962ecab424a3925ebb103784f40d6b6
-
Filesize
87B
MD57e62f6fa7ba08a845e69e30dc2e98b4c
SHA1bcc455715430f023a91eed7558b9a1d2f54b4e4b
SHA256811e3e5424be53ca7266b3bfe6300e6250086772cc7685848f910a0e92cb039f
SHA512af35557f65c1c7562fa2e018cafbdbb9a77b92c75bcdf641e98eaeafab97b10e39fc8f42246f85a3fdb75c9cf3813dd813509842a0011b17e9fcaf4b35efa96a