Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 13:49

General

  • Target

    67c6d93d5aa88d338a5ae0918ef98002.exe

  • Size

    2.0MB

  • MD5

    67c6d93d5aa88d338a5ae0918ef98002

  • SHA1

    6c857b3b3b031598bd23e4c8c0308498dda3eb3d

  • SHA256

    eb69a6b553255baaf7c7a05d8ebeaf3e984098f685246bdba3d6513185187083

  • SHA512

    cca00a1932c9b76d67cb508e2213b8c4150248f8b39b22cff100e71c770bb3f85388bb3ca5f16ab7ef36570efa620d6c2adc77965cf34f3958c5a77673eb607d

  • SSDEEP

    49152:OFUcx88PWPOpX0SFPX5du0t3GtH1SRP09k6yGc:O+K88uPCHvL3mSR8q6yGc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\67c6d93d5aa88d338a5ae0918ef98002.exe
    "C:\Users\Admin\AppData\Local\Temp\67c6d93d5aa88d338a5ae0918ef98002.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Users\Admin\AppData\Local\Temp\3CBB.tmp
      "C:\Users\Admin\AppData\Local\Temp\3CBB.tmp" --splashC:\Users\Admin\AppData\Local\Temp\67c6d93d5aa88d338a5ae0918ef98002.exe DA5A51BB6CB676653CAD281FE06541B15C2466F10F3FCD943E3845AEFCD714163569132F11F74AE595385F061CEF3FE53B65C0F8592E26062585D520DAF9C8AC
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\67c6d93d5aa88d338a5ae0918ef98002.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:3748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3CBB.tmp

    Filesize

    13KB

    MD5

    a561871832a3e275d04e851651f8b631

    SHA1

    25a6214e946623a7dbbf34d85aa37b1284cac331

    SHA256

    942c2640cd9e6ee6d1409b29651ae5015afc14d2f65969d2e6448083207b12e7

    SHA512

    f7484482d8e63ed817304cf01e9cae2d43ce8e77f115f6501682df76954809c367c7584dffe8096076aa89298abd0ed12c330ffa160745bd657e54389101283c

  • C:\Users\Admin\AppData\Local\Temp\3CBB.tmp

    Filesize

    746KB

    MD5

    d00728578bf47d07adff4e1f761c7942

    SHA1

    65fd36c2cd86e145ea511527736a94d5a4f22848

    SHA256

    65f6019229f101ed3e933ee8c46802b6e008ccdcb80d8b732c3931e5d144ed9e

    SHA512

    4b1b496fe2bfb0201f68df4015d3347eab173d1cd6156946ae42e917eadfac2f6d6e83452930492a096c3fe74ced4013d85a44970c7cfa0e25b93a897514c873

  • C:\Users\Admin\AppData\Local\Temp\67c6d93d5aa88d338a5ae0918ef98002.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • memory/1096-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2520-5-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-18-0x00007FFCC9E90000-0x00007FFCC9EA0000-memory.dmp

    Filesize

    64KB

  • memory/3748-26-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-21-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-22-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-23-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-25-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-24-0x00007FFCC7800000-0x00007FFCC7810000-memory.dmp

    Filesize

    64KB

  • memory/3748-20-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-15-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-17-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-16-0x00007FFCC9E90000-0x00007FFCC9EA0000-memory.dmp

    Filesize

    64KB

  • memory/3748-19-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-14-0x00007FFCC9E90000-0x00007FFCC9EA0000-memory.dmp

    Filesize

    64KB

  • memory/3748-27-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-28-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-13-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-29-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-31-0x00007FFCC7800000-0x00007FFCC7810000-memory.dmp

    Filesize

    64KB

  • memory/3748-30-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-32-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB

  • memory/3748-12-0x00007FFCC9E90000-0x00007FFCC9EA0000-memory.dmp

    Filesize

    64KB

  • memory/3748-11-0x00007FFCC9E90000-0x00007FFCC9EA0000-memory.dmp

    Filesize

    64KB

  • memory/3748-45-0x00007FFD09E10000-0x00007FFD0A005000-memory.dmp

    Filesize

    2.0MB