Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
67c6d93d5aa88d338a5ae0918ef98002.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67c6d93d5aa88d338a5ae0918ef98002.exe
Resource
win10v2004-20231222-en
General
-
Target
67c6d93d5aa88d338a5ae0918ef98002.exe
-
Size
2.0MB
-
MD5
67c6d93d5aa88d338a5ae0918ef98002
-
SHA1
6c857b3b3b031598bd23e4c8c0308498dda3eb3d
-
SHA256
eb69a6b553255baaf7c7a05d8ebeaf3e984098f685246bdba3d6513185187083
-
SHA512
cca00a1932c9b76d67cb508e2213b8c4150248f8b39b22cff100e71c770bb3f85388bb3ca5f16ab7ef36570efa620d6c2adc77965cf34f3958c5a77673eb607d
-
SSDEEP
49152:OFUcx88PWPOpX0SFPX5du0t3GtH1SRP09k6yGc:O+K88uPCHvL3mSR8q6yGc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 3CBB.tmp -
Executes dropped EXE 1 IoCs
pid Process 2520 3CBB.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings 3CBB.tmp -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3748 WINWORD.EXE 3748 WINWORD.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2520 3CBB.tmp -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3748 WINWORD.EXE 3748 WINWORD.EXE 3748 WINWORD.EXE 3748 WINWORD.EXE 3748 WINWORD.EXE 3748 WINWORD.EXE 3748 WINWORD.EXE 3748 WINWORD.EXE 3748 WINWORD.EXE 3748 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2520 1096 67c6d93d5aa88d338a5ae0918ef98002.exe 44 PID 1096 wrote to memory of 2520 1096 67c6d93d5aa88d338a5ae0918ef98002.exe 44 PID 1096 wrote to memory of 2520 1096 67c6d93d5aa88d338a5ae0918ef98002.exe 44 PID 2520 wrote to memory of 3748 2520 3CBB.tmp 94 PID 2520 wrote to memory of 3748 2520 3CBB.tmp 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\67c6d93d5aa88d338a5ae0918ef98002.exe"C:\Users\Admin\AppData\Local\Temp\67c6d93d5aa88d338a5ae0918ef98002.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\3CBB.tmp"C:\Users\Admin\AppData\Local\Temp\3CBB.tmp" --splashC:\Users\Admin\AppData\Local\Temp\67c6d93d5aa88d338a5ae0918ef98002.exe DA5A51BB6CB676653CAD281FE06541B15C2466F10F3FCD943E3845AEFCD714163569132F11F74AE595385F061CEF3FE53B65C0F8592E26062585D520DAF9C8AC2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\67c6d93d5aa88d338a5ae0918ef98002.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5a561871832a3e275d04e851651f8b631
SHA125a6214e946623a7dbbf34d85aa37b1284cac331
SHA256942c2640cd9e6ee6d1409b29651ae5015afc14d2f65969d2e6448083207b12e7
SHA512f7484482d8e63ed817304cf01e9cae2d43ce8e77f115f6501682df76954809c367c7584dffe8096076aa89298abd0ed12c330ffa160745bd657e54389101283c
-
Filesize
746KB
MD5d00728578bf47d07adff4e1f761c7942
SHA165fd36c2cd86e145ea511527736a94d5a4f22848
SHA25665f6019229f101ed3e933ee8c46802b6e008ccdcb80d8b732c3931e5d144ed9e
SHA5124b1b496fe2bfb0201f68df4015d3347eab173d1cd6156946ae42e917eadfac2f6d6e83452930492a096c3fe74ced4013d85a44970c7cfa0e25b93a897514c873
-
Filesize
19KB
MD54046ff080673cffac6529512b8d3bdbb
SHA1d3cbc39065b7a55e995fa25397da2140bdac80c1
SHA256f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680
SHA512453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418