Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
274280c0f2dc2def2b1c732a5d24c596.exe
Resource
win7-20231215-en
General
-
Target
274280c0f2dc2def2b1c732a5d24c596.exe
-
Size
99KB
-
MD5
274280c0f2dc2def2b1c732a5d24c596
-
SHA1
e9ab8dc315a36194c19f5b2ca22905cd11c7c70f
-
SHA256
28c7431a15ada133ba58cb17edd757da47901cb14cdaf2df568a196296ba78e6
-
SHA512
54bbaf8c62244f44178ef24027da410f5a1b4aa28f732fdc6076e3f7885793c7b84d264efd074fdfc026f97106674bbd12906917894b7e76b702cba6ed4abf93
-
SSDEEP
3072:NMk0f8swrpziGGxRGtZUlxmIGVk8jwaaHw7Koj4rDM7QJy:mk0KVGxuZgm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 274280c0f2dc2def2b1c732a5d24c596.exe -
Executes dropped EXE 1 IoCs
pid Process 1320 rblmyjwlveixiweu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1516 4728 WerFault.exe 96 2628 4444 WerFault.exe 112 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079728" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1428176959" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31079728" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1708801704" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1428176959" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079728" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8DDF8844-A923-11EE-9BE3-EAB06C7B55B6} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4500 274280c0f2dc2def2b1c732a5d24c596.exe Token: SeDebugPrivilege 4500 274280c0f2dc2def2b1c732a5d24c596.exe Token: SeSecurityPrivilege 1320 rblmyjwlveixiweu.exe Token: SeLoadDriverPrivilege 1320 rblmyjwlveixiweu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1048 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 3536 IEXPLORE.EXE 3536 IEXPLORE.EXE 3536 IEXPLORE.EXE 3536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4728 4500 274280c0f2dc2def2b1c732a5d24c596.exe 96 PID 4500 wrote to memory of 4728 4500 274280c0f2dc2def2b1c732a5d24c596.exe 96 PID 4500 wrote to memory of 4728 4500 274280c0f2dc2def2b1c732a5d24c596.exe 96 PID 4500 wrote to memory of 4728 4500 274280c0f2dc2def2b1c732a5d24c596.exe 96 PID 4500 wrote to memory of 4728 4500 274280c0f2dc2def2b1c732a5d24c596.exe 96 PID 4500 wrote to memory of 4728 4500 274280c0f2dc2def2b1c732a5d24c596.exe 96 PID 4500 wrote to memory of 4728 4500 274280c0f2dc2def2b1c732a5d24c596.exe 96 PID 4500 wrote to memory of 4728 4500 274280c0f2dc2def2b1c732a5d24c596.exe 96 PID 4500 wrote to memory of 4728 4500 274280c0f2dc2def2b1c732a5d24c596.exe 96 PID 4500 wrote to memory of 3856 4500 274280c0f2dc2def2b1c732a5d24c596.exe 108 PID 4500 wrote to memory of 3856 4500 274280c0f2dc2def2b1c732a5d24c596.exe 108 PID 4500 wrote to memory of 3856 4500 274280c0f2dc2def2b1c732a5d24c596.exe 108 PID 3856 wrote to memory of 1048 3856 iexplore.exe 109 PID 3856 wrote to memory of 1048 3856 iexplore.exe 109 PID 1048 wrote to memory of 3536 1048 IEXPLORE.EXE 111 PID 1048 wrote to memory of 3536 1048 IEXPLORE.EXE 111 PID 1048 wrote to memory of 3536 1048 IEXPLORE.EXE 111 PID 4500 wrote to memory of 4444 4500 274280c0f2dc2def2b1c732a5d24c596.exe 112 PID 4500 wrote to memory of 4444 4500 274280c0f2dc2def2b1c732a5d24c596.exe 112 PID 4500 wrote to memory of 4444 4500 274280c0f2dc2def2b1c732a5d24c596.exe 112 PID 4500 wrote to memory of 4444 4500 274280c0f2dc2def2b1c732a5d24c596.exe 112 PID 4500 wrote to memory of 4444 4500 274280c0f2dc2def2b1c732a5d24c596.exe 112 PID 4500 wrote to memory of 4444 4500 274280c0f2dc2def2b1c732a5d24c596.exe 112 PID 4500 wrote to memory of 4444 4500 274280c0f2dc2def2b1c732a5d24c596.exe 112 PID 4500 wrote to memory of 4444 4500 274280c0f2dc2def2b1c732a5d24c596.exe 112 PID 4500 wrote to memory of 4444 4500 274280c0f2dc2def2b1c732a5d24c596.exe 112 PID 4500 wrote to memory of 1324 4500 274280c0f2dc2def2b1c732a5d24c596.exe 115 PID 4500 wrote to memory of 1324 4500 274280c0f2dc2def2b1c732a5d24c596.exe 115 PID 4500 wrote to memory of 1324 4500 274280c0f2dc2def2b1c732a5d24c596.exe 115 PID 1324 wrote to memory of 1244 1324 iexplore.exe 116 PID 1324 wrote to memory of 1244 1324 iexplore.exe 116 PID 4500 wrote to memory of 1320 4500 274280c0f2dc2def2b1c732a5d24c596.exe 120 PID 4500 wrote to memory of 1320 4500 274280c0f2dc2def2b1c732a5d24c596.exe 120 PID 4500 wrote to memory of 1320 4500 274280c0f2dc2def2b1c732a5d24c596.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\274280c0f2dc2def2b1c732a5d24c596.exe"C:\Users\Admin\AppData\Local\Temp\274280c0f2dc2def2b1c732a5d24c596.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 2123⤵
- Program crash
PID:1516
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3536
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 2083⤵
- Program crash
PID:2628
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
PID:1244
-
-
-
C:\Users\Admin\AppData\Local\Temp\rblmyjwlveixiweu.exe"C:\Users\Admin\AppData\Local\Temp\rblmyjwlveixiweu.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4728 -ip 47281⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4444 -ip 44441⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5274280c0f2dc2def2b1c732a5d24c596
SHA1e9ab8dc315a36194c19f5b2ca22905cd11c7c70f
SHA25628c7431a15ada133ba58cb17edd757da47901cb14cdaf2df568a196296ba78e6
SHA51254bbaf8c62244f44178ef24027da410f5a1b4aa28f732fdc6076e3f7885793c7b84d264efd074fdfc026f97106674bbd12906917894b7e76b702cba6ed4abf93