Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
2d5d90d503605ce6f9ac493d72680d19.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d5d90d503605ce6f9ac493d72680d19.exe
Resource
win10v2004-20231215-en
General
-
Target
2d5d90d503605ce6f9ac493d72680d19.exe
-
Size
99KB
-
MD5
2d5d90d503605ce6f9ac493d72680d19
-
SHA1
ecd80682ed4544fad3da63250b177f6ce04df7e3
-
SHA256
df673aec5df7bdf30ef6699d45abedf4d9e5081471528981223fd47b11068484
-
SHA512
66b01ff11887c613e261635525f2614a03308744d9de7a84398afc01a08e461bc599e062bd9c83ffb1b47a66fabd4e7e5576a4ad923a159ea004c2c2d8a37972
-
SSDEEP
1536:n2YnE4M0TMuE89bEKSnCn5mNRqRF1zyoK1EnNAiiRegbOC7:2YE4MmMuESoqn5yR4FVysm3EC7
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3192 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 2d5d90d503605ce6f9ac493d72680d19.exe -
Executes dropped EXE 1 IoCs
pid Process 3092 be8b0230.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ufat32 = "rundll32.exe ufat32.dll,ytus" 2d5d90d503605ce6f9ac493d72680d19.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\9543e975.dll 2d5d90d503605ce6f9ac493d72680d19.exe File created C:\Windows\SysWOW64\c61bdd4d.dll 2d5d90d503605ce6f9ac493d72680d19.exe File opened for modification C:\Windows\SysWOW64\c61bdd4d.dll 2d5d90d503605ce6f9ac493d72680d19.exe File created C:\Windows\SysWOW64\ufat32.dll 2d5d90d503605ce6f9ac493d72680d19.exe File opened for modification C:\Windows\SysWOW64\ufat32.dll 2d5d90d503605ce6f9ac493d72680d19.exe File created C:\Windows\SysWOW64\8c58b05e.dll 2d5d90d503605ce6f9ac493d72680d19.exe File opened for modification C:\Windows\SysWOW64\8c58b05e.dll 2d5d90d503605ce6f9ac493d72680d19.exe File created C:\Windows\SysWOW64\9543e975.dll 2d5d90d503605ce6f9ac493d72680d19.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3956 sc.exe 3384 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 3228 regedit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3936 wrote to memory of 3956 3936 2d5d90d503605ce6f9ac493d72680d19.exe 91 PID 3936 wrote to memory of 3956 3936 2d5d90d503605ce6f9ac493d72680d19.exe 91 PID 3936 wrote to memory of 3956 3936 2d5d90d503605ce6f9ac493d72680d19.exe 91 PID 3936 wrote to memory of 3384 3936 2d5d90d503605ce6f9ac493d72680d19.exe 93 PID 3936 wrote to memory of 3384 3936 2d5d90d503605ce6f9ac493d72680d19.exe 93 PID 3936 wrote to memory of 3384 3936 2d5d90d503605ce6f9ac493d72680d19.exe 93 PID 3936 wrote to memory of 3192 3936 2d5d90d503605ce6f9ac493d72680d19.exe 95 PID 3936 wrote to memory of 3192 3936 2d5d90d503605ce6f9ac493d72680d19.exe 95 PID 3936 wrote to memory of 3192 3936 2d5d90d503605ce6f9ac493d72680d19.exe 95 PID 3936 wrote to memory of 3092 3936 2d5d90d503605ce6f9ac493d72680d19.exe 99 PID 3936 wrote to memory of 3092 3936 2d5d90d503605ce6f9ac493d72680d19.exe 99 PID 3936 wrote to memory of 3092 3936 2d5d90d503605ce6f9ac493d72680d19.exe 99 PID 3092 wrote to memory of 3228 3092 be8b0230.exe 100 PID 3092 wrote to memory of 3228 3092 be8b0230.exe 100 PID 3092 wrote to memory of 3228 3092 be8b0230.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5d90d503605ce6f9ac493d72680d19.exe"C:\Users\Admin\AppData\Local\Temp\2d5d90d503605ce6f9ac493d72680d19.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ufat32 type= share start= auto DisplayName= "FAT Utility DLL" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\ufat32.dll,ytus"2⤵
- Launches sc.exe
PID:3956
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ufat32 "FAT Utility DLL"2⤵
- Launches sc.exe
PID:3384
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe firewall add portopening TCP 1616 messenger2⤵
- Modifies Windows Firewall
PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\be8b0230.exe"C:\Users\Admin\AppData\Local\Temp\be8b0230.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\regedit.exeregedit.exe -s C:\ParaTemp.reg3⤵
- Runs .reg file with regedit
PID:3228
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165B
MD5a4c2e8db757227a15a4218839aea3fd6
SHA10f98e0549c034c5f8ac2d89a39b4347df9330578
SHA25636d55faef433946b20a9337da2a8529207fd992a280081c4467b8cd8bebc6200
SHA5125f9adeb1517c07f5d3669095471ea79bddc7740ca3da729b8249c86f5303effd10daeb873b9e76462fc6fc61bbf3ae3124253ea36e7196cc81fd5937f28afe23
-
Filesize
4KB
MD5e6530213df7a3a99834341697287ec2f
SHA1fc7de2d227e16766feb6b4ec5d480b55e53840aa
SHA256a3e939fe85d84fd9a15a7e654b0334c29d22142ec91f9f9ef3bda8538b08991b
SHA5125bdf1e3dc2ed0e13e1e22d4281dddbb9f8d54ea3d6225aaa3a8d9f56943e547baf2a5520db3355cb3441b3d85afbbc412208b60b1deaed26e8f67d7795371a88