Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 07:27

General

  • Target

    2d5d90d503605ce6f9ac493d72680d19.exe

  • Size

    99KB

  • MD5

    2d5d90d503605ce6f9ac493d72680d19

  • SHA1

    ecd80682ed4544fad3da63250b177f6ce04df7e3

  • SHA256

    df673aec5df7bdf30ef6699d45abedf4d9e5081471528981223fd47b11068484

  • SHA512

    66b01ff11887c613e261635525f2614a03308744d9de7a84398afc01a08e461bc599e062bd9c83ffb1b47a66fabd4e7e5576a4ad923a159ea004c2c2d8a37972

  • SSDEEP

    1536:n2YnE4M0TMuE89bEKSnCn5mNRqRF1zyoK1EnNAiiRegbOC7:2YE4MmMuESoqn5yR4FVysm3EC7

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d5d90d503605ce6f9ac493d72680d19.exe
    "C:\Users\Admin\AppData\Local\Temp\2d5d90d503605ce6f9ac493d72680d19.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create ufat32 type= share start= auto DisplayName= "FAT Utility DLL" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\ufat32.dll,ytus"
      2⤵
      • Launches sc.exe
      PID:3956
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description ufat32 "FAT Utility DLL"
      2⤵
      • Launches sc.exe
      PID:3384
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe firewall add portopening TCP 1616 messenger
      2⤵
      • Modifies Windows Firewall
      PID:3192
    • C:\Users\Admin\AppData\Local\Temp\be8b0230.exe
      "C:\Users\Admin\AppData\Local\Temp\be8b0230.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3092
      • C:\Windows\SysWOW64\regedit.exe
        regedit.exe -s C:\ParaTemp.reg
        3⤵
        • Runs .reg file with regedit
        PID:3228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ParaTemp.reg

    Filesize

    165B

    MD5

    a4c2e8db757227a15a4218839aea3fd6

    SHA1

    0f98e0549c034c5f8ac2d89a39b4347df9330578

    SHA256

    36d55faef433946b20a9337da2a8529207fd992a280081c4467b8cd8bebc6200

    SHA512

    5f9adeb1517c07f5d3669095471ea79bddc7740ca3da729b8249c86f5303effd10daeb873b9e76462fc6fc61bbf3ae3124253ea36e7196cc81fd5937f28afe23

  • C:\Users\Admin\AppData\Local\Temp\be8b0230.exe

    Filesize

    4KB

    MD5

    e6530213df7a3a99834341697287ec2f

    SHA1

    fc7de2d227e16766feb6b4ec5d480b55e53840aa

    SHA256

    a3e939fe85d84fd9a15a7e654b0334c29d22142ec91f9f9ef3bda8538b08991b

    SHA512

    5bdf1e3dc2ed0e13e1e22d4281dddbb9f8d54ea3d6225aaa3a8d9f56943e547baf2a5520db3355cb3441b3d85afbbc412208b60b1deaed26e8f67d7795371a88

  • memory/3092-17-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3092-21-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3936-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3936-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB