Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
21ad40ebba38ba8b5112e5efa800de23.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21ad40ebba38ba8b5112e5efa800de23.exe
Resource
win10v2004-20231215-en
General
-
Target
21ad40ebba38ba8b5112e5efa800de23.exe
-
Size
123KB
-
MD5
21ad40ebba38ba8b5112e5efa800de23
-
SHA1
3e2702cfd93c19a61ff840e90f2b8ae8a9219cc5
-
SHA256
a68472503f47b5c26530df3d7f346cd94a2641f94fe81092c6e1dc968de543ba
-
SHA512
205decc5aede504c71898d5f6a59002fb5f48014c4846e2110b0d3cf019daec3dc3f93f036f90c495ee168593d4a111d6360125f064b7607e516500db7ce4297
-
SSDEEP
3072:JNV7lSLVJy8cfzsbZpZhrVFBmQy6Ge2QLxo:JPl0y/fcZbnlHGgLxo
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run sgcxcxxaspf081223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\maincyucst = "C:\\Windows\\system32\\inf\\svchoct.exe C:\\Windows\\wftadfi16_081223a.dll d16tan" sgcxcxxaspf081223.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 21ad40ebba38ba8b5112e5efa800de23.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchoct.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation sgcxcxxaspf081223.exe -
Executes dropped EXE 2 IoCs
pid Process 4372 svchoct.exe 1040 sgcxcxxaspf081223.exe -
Loads dropped DLL 2 IoCs
pid Process 4372 svchoct.exe 4372 svchoct.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\inf\svchoct.exe 21ad40ebba38ba8b5112e5efa800de23.exe File created C:\Windows\SysWOW64\inf\sppdcrs081223.scr 21ad40ebba38ba8b5112e5efa800de23.exe File created C:\Windows\SysWOW64\inf\scsys16_081223.dll 21ad40ebba38ba8b5112e5efa800de23.exe File created C:\Windows\SysWOW64\inf\svchoct.exe 21ad40ebba38ba8b5112e5efa800de23.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\tawisys.ini 21ad40ebba38ba8b5112e5efa800de23.exe File created C:\Windows\system\sgcxcxxaspf081223.exe 21ad40ebba38ba8b5112e5efa800de23.exe File created C:\Windows\dcbdcatys32_081223a.dll 21ad40ebba38ba8b5112e5efa800de23.exe File created C:\Windows\wftadfi16_081223a.dll 21ad40ebba38ba8b5112e5efa800de23.exe File opened for modification C:\Windows\tawisys.ini sgcxcxxaspf081223.exe File created C:\Windows\dcbdcatys32_081223a.dll sgcxcxxaspf081223.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31080295" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "411176599" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" sgcxcxxaspf081223.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1980704778" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A17D1348-AB5A-11EE-9963-F21AB124C203} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1980391930" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1980391930" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31080295" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1980704778" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31080295" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31080295" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2108 21ad40ebba38ba8b5112e5efa800de23.exe 2108 21ad40ebba38ba8b5112e5efa800de23.exe 2108 21ad40ebba38ba8b5112e5efa800de23.exe 2108 21ad40ebba38ba8b5112e5efa800de23.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe 1040 sgcxcxxaspf081223.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2108 21ad40ebba38ba8b5112e5efa800de23.exe Token: SeDebugPrivilege 2108 21ad40ebba38ba8b5112e5efa800de23.exe Token: SeDebugPrivilege 1040 sgcxcxxaspf081223.exe Token: SeDebugPrivilege 1040 sgcxcxxaspf081223.exe Token: SeDebugPrivilege 1040 sgcxcxxaspf081223.exe Token: SeDebugPrivilege 1040 sgcxcxxaspf081223.exe Token: SeDebugPrivilege 1040 sgcxcxxaspf081223.exe Token: SeDebugPrivilege 1040 sgcxcxxaspf081223.exe Token: SeDebugPrivilege 1040 sgcxcxxaspf081223.exe Token: SeDebugPrivilege 1040 sgcxcxxaspf081223.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 368 IEXPLORE.EXE 368 IEXPLORE.EXE 368 IEXPLORE.EXE 368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2108 wrote to memory of 4372 2108 21ad40ebba38ba8b5112e5efa800de23.exe 95 PID 2108 wrote to memory of 4372 2108 21ad40ebba38ba8b5112e5efa800de23.exe 95 PID 2108 wrote to memory of 4372 2108 21ad40ebba38ba8b5112e5efa800de23.exe 95 PID 2108 wrote to memory of 4892 2108 21ad40ebba38ba8b5112e5efa800de23.exe 94 PID 2108 wrote to memory of 4892 2108 21ad40ebba38ba8b5112e5efa800de23.exe 94 PID 2108 wrote to memory of 4892 2108 21ad40ebba38ba8b5112e5efa800de23.exe 94 PID 4372 wrote to memory of 2976 4372 svchoct.exe 97 PID 4372 wrote to memory of 2976 4372 svchoct.exe 97 PID 4372 wrote to memory of 2976 4372 svchoct.exe 97 PID 2976 wrote to memory of 1040 2976 cmd.exe 98 PID 2976 wrote to memory of 1040 2976 cmd.exe 98 PID 2976 wrote to memory of 1040 2976 cmd.exe 98 PID 1040 wrote to memory of 1820 1040 sgcxcxxaspf081223.exe 107 PID 1040 wrote to memory of 1820 1040 sgcxcxxaspf081223.exe 107 PID 1820 wrote to memory of 368 1820 IEXPLORE.EXE 108 PID 1820 wrote to memory of 368 1820 IEXPLORE.EXE 108 PID 1820 wrote to memory of 368 1820 IEXPLORE.EXE 108 PID 1040 wrote to memory of 1820 1040 sgcxcxxaspf081223.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ad40ebba38ba8b5112e5efa800de23.exe"C:\Users\Admin\AppData\Local\Temp\21ad40ebba38ba8b5112e5efa800de23.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\21ad40ebba38ba8b5112e5efa800de23.exe"2⤵PID:4892
-
-
C:\Windows\SysWOW64\inf\svchoct.exe"C:\Windows\system32\inf\svchoct.exe" C:\Windows\wftadfi16_081223a.dll d16tan2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "c:\mylbs3tecj.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system\sgcxcxxaspf081223.exe"C:\Windows\system\sgcxcxxaspf081223.exe" i4⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:368
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
123KB
MD521ad40ebba38ba8b5112e5efa800de23
SHA13e2702cfd93c19a61ff840e90f2b8ae8a9219cc5
SHA256a68472503f47b5c26530df3d7f346cd94a2641f94fe81092c6e1dc968de543ba
SHA512205decc5aede504c71898d5f6a59002fb5f48014c4846e2110b0d3cf019daec3dc3f93f036f90c495ee168593d4a111d6360125f064b7607e516500db7ce4297
-
Filesize
236KB
MD5f11e8839e7523778b7ce91fe7a405814
SHA135115ca4d16e3db0c6fd3e0ae298ac380e6da8cb
SHA2565266e86873177107d5d8d3e8bc7c734ab84c71f828289cd2bc18e518a94eb17d
SHA512f85894f1f8b7d17541dc5f3ed435d15108bcc5b06f20efe066c6f1712cb4ae5545a50182dc903a96a76f48ecbdb1b842930106a855c2b7b36beeb68f8140355f
-
Filesize
133B
MD596db3991b815fcae6f7547e59c423601
SHA1f068557a3b9456d9d3dc28a980cb65df6dc422ab
SHA256fbde73ab608799c03d2139d50703abdf8106e88d7874a6fe6ec3cc20f83ba721
SHA5123eb3567b71c3df4d6e4e58bff44e0ac031063e2bc44b9b0d8a81f0765db5ca5b1219797c364def05e1aae3ce8114808136ccca3b077a8a00cf384cd89bdae6f3
-
Filesize
384B
MD53fe4da3002f9b667570fa0595525dbf9
SHA1c010b89db5a2fee8a66e20e63c7c844c0ca2f33d
SHA2563e845268ad5c6850141be7b96e228f25d3d0c8ec6a980ff048a044aa37b7fd27
SHA5120d575d285cfff6472aece7f76e169f34c86d4454ce1fe8e1a055b8c8ec5a31ca9a126c01979d1d723c2b7710eb39450aca9205ef813fd73e079a33cb56749705
-
Filesize
435B
MD557fefac010c031fe46ab21f2b4731b05
SHA1e2f5328bb74ec22e461125195eb25cf1affa1b6e
SHA2564a41697f7b21980f057a93c9331011738804300dbabb7de67b4c9d2e1ded06c1
SHA512bb277c5c01cb290dd0e6907320c69c8f563e1db28d865bcf759aa6bf6b3e0bfd55297ec39bd0fddef449997811beb7ad6f1f2797c3074ac5f8bcb1a2ccf5aeff
-
Filesize
468B
MD598879f19f60013702adbd4753b4297ec
SHA172582bf61b158c5ebb5b8c62d76b8f16554b489b
SHA2565d282278d3c6dd792d42da16de8c8e5ddcc2b4d73edb28e187a02d9243da4a28
SHA512f39a3e653657856615dbf8a8b0f7d3afd36e438a39eedf27dfe88da0e2f5fdd25a53254f302cfaf51abf401b8014e84bcc47891907f9bb833116679a652539fb
-
Filesize
70B
MD56bc2707d4f367dcbe27f33969b861d14
SHA1f76c20844691ec031ea297374a13eab9a1cec598
SHA256c0b3697f097c241ec889493f24adf8286a093071ff2c32d51f63d517c38ad03c
SHA512912d93eb34a4b1bb857710bb63bc295e9e7cba6ec164d75a9b9bdcef2c0ffb7648be0487f4a8c2e76a3decb12f4ec9115f04b696512ebab50185e1a92ec903af
-
Filesize
495B
MD561645ad3047e062a4ff7f3e7ad258cb7
SHA13d3214a9f53675003373372cbc21173d2464863d
SHA256eb997f03412431a434b74b2b3107685f8e2ef6ba8a228182d3d8c715ab26bf77
SHA512ebd67254c13c107609ae1f33cfa20f281222d26a714b7677ffb7c62613f535849867c6d7d5d29cceb2071e6dfc94881afc3bac7c5e8ae17d11c81b33ba0c7ae3
-
Filesize
36KB
MD5201dff7c81ae1e05d4550bfaf93ad469
SHA1cae1e5530988734f89521e46f4890eaeaab3b84c
SHA2568ef55757f30292b735e694b471c926dd31d6c674f89bc8abff4e9ae9575d411d
SHA51215ab50e0165964c3c40f98003c741011b5cf1f05bccfe57d5ef7c71e29d99a54bea800b6bc7b9e4f8987192be30a52ef4dc7160649aa367e5a2cb250ed0a92dc
-
Filesize
53B
MD5da61e5e79afbc1c6f145fbbb67694d44
SHA1a3cfcbf1b3da4bfa7a481757ae3f95e06b02f1cc
SHA256fe892d6088d6f97bd93fb1539be587f5202f2623f6105a48cb88bbb197fa9a92
SHA51236bdc3f9013019b3d2859b6b230c0c57acede2ddc7cfe4d68cb149e66bc303d080ac7f46124e7e0293055ac31434b73397ad5e175e7ec5181cff0063fa4c3488