Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
4718067e3e7b2de52dcdb60475f4f800.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4718067e3e7b2de52dcdb60475f4f800.exe
Resource
win10v2004-20231215-en
General
-
Target
4718067e3e7b2de52dcdb60475f4f800.exe
-
Size
12.5MB
-
MD5
4718067e3e7b2de52dcdb60475f4f800
-
SHA1
e8dc7059536917d1e9bd7d0aff721f945785db1d
-
SHA256
b2b52413eb8374756d3fff43e2f16d6229dc1327edd1f5fb225bd3c0fecad4f8
-
SHA512
3f5866d8bf4ea81143be22e032643677d01d7fa8e2cc77d5a5c68c03c2c8697b8241ebe6c60f96bc7b36651d26073f568a9204158523ab48962c1e337eb55561
-
SSDEEP
49152:CWqmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm7:
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4496 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\upovqebl\ImagePath = "C:\\Windows\\SysWOW64\\upovqebl\\vrjjgvui.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 4718067e3e7b2de52dcdb60475f4f800.exe -
Deletes itself 1 IoCs
pid Process 4964 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2132 vrjjgvui.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2132 set thread context of 4964 2132 vrjjgvui.exe 105 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3472 sc.exe 1072 sc.exe 1156 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4120 972 WerFault.exe 86 2992 2132 WerFault.exe 100 -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 972 wrote to memory of 1740 972 4718067e3e7b2de52dcdb60475f4f800.exe 90 PID 972 wrote to memory of 1740 972 4718067e3e7b2de52dcdb60475f4f800.exe 90 PID 972 wrote to memory of 1740 972 4718067e3e7b2de52dcdb60475f4f800.exe 90 PID 972 wrote to memory of 1624 972 4718067e3e7b2de52dcdb60475f4f800.exe 92 PID 972 wrote to memory of 1624 972 4718067e3e7b2de52dcdb60475f4f800.exe 92 PID 972 wrote to memory of 1624 972 4718067e3e7b2de52dcdb60475f4f800.exe 92 PID 972 wrote to memory of 3472 972 4718067e3e7b2de52dcdb60475f4f800.exe 94 PID 972 wrote to memory of 3472 972 4718067e3e7b2de52dcdb60475f4f800.exe 94 PID 972 wrote to memory of 3472 972 4718067e3e7b2de52dcdb60475f4f800.exe 94 PID 972 wrote to memory of 1072 972 4718067e3e7b2de52dcdb60475f4f800.exe 96 PID 972 wrote to memory of 1072 972 4718067e3e7b2de52dcdb60475f4f800.exe 96 PID 972 wrote to memory of 1072 972 4718067e3e7b2de52dcdb60475f4f800.exe 96 PID 972 wrote to memory of 1156 972 4718067e3e7b2de52dcdb60475f4f800.exe 98 PID 972 wrote to memory of 1156 972 4718067e3e7b2de52dcdb60475f4f800.exe 98 PID 972 wrote to memory of 1156 972 4718067e3e7b2de52dcdb60475f4f800.exe 98 PID 972 wrote to memory of 4496 972 4718067e3e7b2de52dcdb60475f4f800.exe 101 PID 972 wrote to memory of 4496 972 4718067e3e7b2de52dcdb60475f4f800.exe 101 PID 972 wrote to memory of 4496 972 4718067e3e7b2de52dcdb60475f4f800.exe 101 PID 2132 wrote to memory of 4964 2132 vrjjgvui.exe 105 PID 2132 wrote to memory of 4964 2132 vrjjgvui.exe 105 PID 2132 wrote to memory of 4964 2132 vrjjgvui.exe 105 PID 2132 wrote to memory of 4964 2132 vrjjgvui.exe 105 PID 2132 wrote to memory of 4964 2132 vrjjgvui.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\4718067e3e7b2de52dcdb60475f4f800.exe"C:\Users\Admin\AppData\Local\Temp\4718067e3e7b2de52dcdb60475f4f800.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\upovqebl\2⤵PID:1740
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vrjjgvui.exe" C:\Windows\SysWOW64\upovqebl\2⤵PID:1624
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create upovqebl binPath= "C:\Windows\SysWOW64\upovqebl\vrjjgvui.exe /d\"C:\Users\Admin\AppData\Local\Temp\4718067e3e7b2de52dcdb60475f4f800.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:3472
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description upovqebl "wifi internet conection"2⤵
- Launches sc.exe
PID:1072
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start upovqebl2⤵
- Launches sc.exe
PID:1156
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 10362⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\upovqebl\vrjjgvui.exeC:\Windows\SysWOW64\upovqebl\vrjjgvui.exe /d"C:\Users\Admin\AppData\Local\Temp\4718067e3e7b2de52dcdb60475f4f800.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 5162⤵
- Program crash
PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 972 -ip 9721⤵PID:768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2132 -ip 21321⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.6MB
MD513301448c67a17519893caf5f2376791
SHA1d165c06c997f4402bc400b8c04bc997efe72fed5
SHA256f70a76a46c7d0091484b49802f83235266876743ffe96f221e422e7c10b551b8
SHA51230516778f3c508c558bd3bcbabd0f5b0c4ff1645ccda0fbdbe7fd71f3035f26b9ff653d9e6de861c6166e77d8bac92e2803a38eb8cf13a807cc30a33805990a8
-
Filesize
2.1MB
MD51d9d882be3e198a68a0d347ca723f848
SHA1c2a338bac751710f484ec532325fb6a1d8b60573
SHA2564f3bb52e6bf40171118135e0d70570c04050bd07b9188b59acfca4d08cc68ba2
SHA512fb887fe70be8c3bfd39f2ead01ff71a4fe83137e4739058ad2be0610dac2f132a147c5163762037ccb31508c24883384b10e2d9bb79d0bcd7dedb4a9f3999701